From 0d388cac5ca5cf6c5db1eaa310cde7d39b197196 Mon Sep 17 00:00:00 2001 From: "A.Arnold" Date: Tue, 6 Aug 2024 03:06:58 +0100 Subject: [PATCH 1/2] MTA-3589: Broken link Signed-off-by: A.Arnold --- docs/topics/mta-rn-resolved-issues-7-0-3.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/topics/mta-rn-resolved-issues-7-0-3.adoc b/docs/topics/mta-rn-resolved-issues-7-0-3.adoc index 03cac2abfa..b8578aa03d 100644 --- a/docs/topics/mta-rn-resolved-issues-7-0-3.adoc +++ b/docs/topics/mta-rn-resolved-issues-7-0-3.adoc @@ -72,7 +72,7 @@ For more details, see link:https://access.redhat.com/security/cve/CVE-2024-24786 A flaw was found in versions of the `follow-redirects` package before 1.1.5. This flaw occurs when `follow-redirects` handles cross-domain redirects. It fails to clear the `proxy-authentication` header, which may contain credentials, while it clears the authorization header. As a result, this vulnerability could potentially lead to the leak of sensitive credentials.  -For more details, see line:https://access.redhat.com/security/cve/CVE-2024-28849[(CVE-2024-28849)]. +For more details, see link:https://access.redhat.com/security/cve/cveCVE-2024-28849[(CVE-2024-28849)]. .Fixed incorrect assessment status when running an assessment on two questionnaires From 0de7aaec4ee67e5cc2df012b4908da28aa20834f Mon Sep 17 00:00:00 2001 From: "A.Arnold" Date: Tue, 6 Aug 2024 03:09:55 +0100 Subject: [PATCH 2/2] update Signed-off-by: A.Arnold --- docs/topics/mta-rn-resolved-issues-7-0-3.adoc | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/topics/mta-rn-resolved-issues-7-0-3.adoc b/docs/topics/mta-rn-resolved-issues-7-0-3.adoc index b8578aa03d..0750827837 100644 --- a/docs/topics/mta-rn-resolved-issues-7-0-3.adoc +++ b/docs/topics/mta-rn-resolved-issues-7-0-3.adoc @@ -72,7 +72,7 @@ For more details, see link:https://access.redhat.com/security/cve/CVE-2024-24786 A flaw was found in versions of the `follow-redirects` package before 1.1.5. This flaw occurs when `follow-redirects` handles cross-domain redirects. It fails to clear the `proxy-authentication` header, which may contain credentials, while it clears the authorization header. As a result, this vulnerability could potentially lead to the leak of sensitive credentials.  -For more details, see link:https://access.redhat.com/security/cve/cveCVE-2024-28849[(CVE-2024-28849)]. +For more details, see link:https://access.redhat.com/security/cve/cve-2024-28849[(CVE-2024-28849)]. .Fixed incorrect assessment status when running an assessment on two questionnaires