Skip to content

Commit

Permalink
more link fixes
Browse files Browse the repository at this point in the history
  • Loading branch information
markdboyd committed Jun 4, 2024
1 parent f95d81e commit 480f838
Show file tree
Hide file tree
Showing 3 changed files with 5 additions and 5 deletions.
2 changes: 1 addition & 1 deletion _posts/2016-11-18-release-notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,5 +22,5 @@ Curious what’s new that you might find helpful as a cloud.gov application deve
### Security
You can [restage](https://docs.cloudfoundry.org/devguide/deploy-apps/start-restart-restage.html#restage) your application to incorporate the latest security fixes and ensure you’re running the most recent language version supported.

- The PHP buildpack update addresses [USN-3095-1](https://www.ubuntu.com/usn/usn-3095-1/) (assorted PHP vulnerabilities) with PHP 5.6.27 and 7.0.12. The associated CVEs are [CVE-2016-7124](https://ubuntu.com/security/CVE-2016-7124), [CVE-2016-7125](https://ubuntu.com/security/CVE-2016-7125), [CVE-2016-7127](https://ubuntu.com/security/CVE-2016-7127), [CVE-2016-7128](https://ubuntu.com/security/CVE-2016-7128), [CVE-2016-7129](https://ubuntu.com/security/CVE-2016-7129), [CVE-2016-7130](https://ubuntu.com/security/CVE-2016-7130), [CVE-2016-7131](https://ubuntu.com/security/CVE-2016-7131), [CVE-2016-7132](https://ubuntu.com/security/CVE-2016-7132), [CVE-2016-7133](https://ubuntu.com/security/CVE-2016-7133), [CVE-2016-7134](https://ubuntu.com/security/CVE-2016-7134), [CVE-2016-7411](https://ubuntu.com/security/CVE-2016-7411), [CVE-2016-7412](https://ubuntu.com/security/2016/CVE-2016-7412), [CVE-2016-7413](https://ubuntu.com/security/CVE-2016-7413), [CVE-2016-7414](https://ubuntu.com/security/CVE-2016-7414), [CVE-2016-7416](https://ubuntu.com/security/CVE-2016-7416), [CVE-2016-7417](https://ubuntu.com/security/CVE-2016-7418), [CVE-2016-7418](https://ubuntu.com/security/CVE-2016-7418)
- The PHP buildpack update addresses [USN-3095-1](https://www.ubuntu.com/usn/usn-3095-1/) (assorted PHP vulnerabilities) with PHP 5.6.27 and 7.0.12. The associated CVEs are [CVE-2016-7124](https://ubuntu.com/security/CVE-2016-7124), [CVE-2016-7125](https://ubuntu.com/security/CVE-2016-7125), [CVE-2016-7127](https://ubuntu.com/security/CVE-2016-7127), [CVE-2016-7128](https://ubuntu.com/security/CVE-2016-7128), [CVE-2016-7129](https://ubuntu.com/security/CVE-2016-7129), [CVE-2016-7130](https://ubuntu.com/security/CVE-2016-7130), [CVE-2016-7131](https://ubuntu.com/security/CVE-2016-7131), [CVE-2016-7132](https://ubuntu.com/security/CVE-2016-7132), [CVE-2016-7133](https://ubuntu.com/security/CVE-2016-7133), [CVE-2016-7134](https://ubuntu.com/security/CVE-2016-7134), [CVE-2016-7411](https://ubuntu.com/security/CVE-2016-7411), [CVE-2016-7412](https://ubuntu.com/security/CVE-2016-7412), [CVE-2016-7413](https://ubuntu.com/security/CVE-2016-7413), [CVE-2016-7414](https://ubuntu.com/security/CVE-2016-7414), [CVE-2016-7416](https://ubuntu.com/security/CVE-2016-7416), [CVE-2016-7417](https://ubuntu.com/security/CVE-2016-7418), [CVE-2016-7418](https://ubuntu.com/security/CVE-2016-7418)
- The Node buildpack update addresses [USN-3087-1](https://www.ubuntu.com/usn/usn-3087-1/) (assorted OpenSSL vulnerabilities) with node 6.8.1 and 6.9.0. The associated CVEs are [CVE-2016-2177](https://ubuntu.com/security/CVE-2016-2177), [CVE-2016-2178](https://ubuntu.com/security/CVE-2016-2178), [CVE-2016-2179](https://ubuntu.com/security/CVE-2016-2179), [CVE-2016-2180](https://ubuntu.com/security/CVE-2016-2180), [CVE-2016-2181](https://ubuntu.com/security/CVE-2016-2181), [CVE-2016-2182](https://ubuntu.com/security/CVE-2016-2182), [CVE-2016-2183](https://ubuntu.com/security/CVE-2016-2183), [CVE-2016-6302](https://ubuntu.com/security/CVE-2016-6302), [CVE-2016-6303](https://ubuntu.com/security/CVE-2016-6303), [CVE-2016-6304](https://ubuntu.com/security/CVE-2016-6304), [CVE-2016-6306](https://ubuntu.com/security/CVE-2016-6306)
6 changes: 3 additions & 3 deletions _posts/2016-11-30-release-notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,6 @@ Curious what’s new that you might find helpful as a cloud.gov application deve
The base filesystem used for running your application has been updated to address several security vulnerabilities. You can [restage your application](http://cli.cloudfoundry.org/en-US/cf/restage.html) to ensure you [incorporate fixes in the base filesystem](https://docs.cloudfoundry.org/devguide/deploy-apps/stacks.html#cli-commands) and are running the most recent language version supported by your [buildpack](https://docs.cloudfoundry.org/buildpacks/).

- [USN-3116-1: DBus vulnerabilities](https://www.ubuntu.com/usn/usn-3116-1/). The associated CVE is [CVE-2015-0245](https://ubuntu.com/security/2015/CVE-2015-0245)
- [USN-3117-1: GD library vulnerabilities](https://www.ubuntu.com/usn/usn-3117-1/). The associated CVEs are [CVE-2016-6911](https://ubuntu.com/security/2016/CVE-2016-6911), [CVE-2016-7568](https://ubuntu.com/security/2016/CVE-2016-7568), [CVE-2016-8670](https://ubuntu.com/security/2016/CVE-2016-8670)
- [USN-3119-1: Bind vulnerability](https://www.ubuntu.com/usn/usn-3119-1/). The associated CVE is [CVE-2016-8864](https://ubuntu.com/security/2016/CVE-2016-8864)
- [USN-3123-1: curl vulnerabilities](https://www.ubuntu.com/usn/usn-3123-1/). The associated CVEs are [CVE-2016-7141](https://ubuntu.com/security/2016/CVE-2016-7141), [CVE-2016-7167](https://ubuntu.com/security/2016/CVE-2016-7167), [CVE-2016-8615](https://ubuntu.com/security/2016/CVE-2016-8615), [CVE-2016-8616](https://ubuntu.com/security/2016/CVE-2016-8616), [CVE-2016-8617](https://ubuntu.com/security/2016/CVE-2016-8617), [CVE-2016-8618](https://ubuntu.com/security/2016/CVE-2016-8618), [CVE-2016-8619](https://ubuntu.com/security/2016/CVE-2016-8619), [CVE-2016-8620](https://ubuntu.com/security/2016/CVE-2016-8620), [CVE-2016-8621](https://ubuntu.com/security/2016/CVE-2016-8621), [CVE-2016-8622](https://ubuntu.com/security/2016/CVE-2016-8622), [CVE-2016-8623](https://ubuntu.com/security/2016/CVE-2016-8623), [CVE-2016-8624](https://ubuntu.com/security/2016/CVE-2016-8624)
- [USN-3117-1: GD library vulnerabilities](https://www.ubuntu.com/usn/usn-3117-1/). The associated CVEs are [CVE-2016-6911](https://ubuntu.com/security/CVE-2016-6911), [CVE-2016-7568](https://ubuntu.com/security/CVE-2016-7568), [CVE-2016-8670](https://ubuntu.com/security/CVE-2016-8670)
- [USN-3119-1: Bind vulnerability](https://www.ubuntu.com/usn/usn-3119-1/). The associated CVE is [CVE-2016-8864](https://ubuntu.com/security/CVE-2016-8864)
- [USN-3123-1: curl vulnerabilities](https://www.ubuntu.com/usn/usn-3123-1/). The associated CVEs are [CVE-2016-7141](https://ubuntu.com/security/CVE-2016-7141), [CVE-2016-7167](https://ubuntu.com/security/CVE-2016-7167), [CVE-2016-8615](https://ubuntu.com/security/CVE-2016-8615), [CVE-2016-8616](https://ubuntu.com/security/CVE-2016-8616), [CVE-2016-8617](https://ubuntu.com/security/CVE-2016-8617), [CVE-2016-8618](https://ubuntu.com/security/CVE-2016-8618), [CVE-2016-8619](https://ubuntu.com/security/CVE-2016-8619), [CVE-2016-8620](https://ubuntu.com/security/CVE-2016-8620), [CVE-2016-8621](https://ubuntu.com/security/CVE-2016-8621), [CVE-2016-8622](https://ubuntu.com/security/CVE-2016-8622), [CVE-2016-8623](https://ubuntu.com/security/CVE-2016-8623), [CVE-2016-8624](https://ubuntu.com/security/CVE-2016-8624)
2 changes: 1 addition & 1 deletion _posts/2017-07-18-release-notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,7 @@ You should [restage your application](http://cli.cloudfoundry.org/en-US/cf/resta
* Buildpack updates:
* [PHP v4.3.29](https://github.com/cloudfoundry/php-buildpack/releases/tag/v4.3.29)
* [.NET Core v1.0.21](https://github.com/cloudfoundry/dotnet-core-buildpack/releases/tag/v1.0.21)
* [NodeJS v1.6.2](https://github.com/cloudfoundry/nodejs-buildpack/releases/tag/v1.6.2), which remediates [CVE-2017-1000381 - c-ares NAPTR parser out of bounds access](https://ubuntu.com/security/2017/CVE-2017-1000381.html)
* [NodeJS v1.6.2](https://github.com/cloudfoundry/nodejs-buildpack/releases/tag/v1.6.2), which remediates [CVE-2017-1000381 - c-ares NAPTR parser out of bounds access](https://ubuntu.com/security/CVE-2017-1000381.html)
* [Python v1.5.20](https://github.com/cloudfoundry/python-buildpack/releases/tag/v1.5.20)
* [Staticfile v1.4.10](https://github.com/cloudfoundry/staticfile-buildpack/releases/tag/v1.4.10)
* [Ruby v1.6.43](https://github.com/cloudfoundry/ruby-buildpack/releases/tag/v1.6.43)
Expand Down

0 comments on commit 480f838

Please sign in to comment.