diff --git a/data/release-notes/enterprise-server/3-10/8.yml b/data/release-notes/enterprise-server/3-10/8.yml index dfbec25bbe..a10c1e1911 100644 --- a/data/release-notes/enterprise-server/3-10/8.yml +++ b/data/release-notes/enterprise-server/3-10/8.yml @@ -8,9 +8,9 @@ intro: | sections: security_fixes: - | - **HIGH**: On an instance with GitHub Connect enabled and non-default settings for GitHub Connect configured, an attacker could use an enterprise GitHub Actions download token to fetch private repository data. This token is only accessible to users on the GitHub Enterprise Server instance. To fix this vulnerability, the Actions download token will now be a permissionless token. GitHub has requested CVE ID [CVE-2024-1908](https://www.cve.org/cverecord?id=CVE-2024-1908) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com/). + **HIGH**: On an instance with GitHub Connect enabled and non-default settings for GitHub Connect configured, an attacker could use an enterprise GitHub Actions download token to fetch private repository data. This token is only accessible to users on the GitHub Enterprise Server instance. To fix this vulnerability, the Actions download token will now be a permissionless token. GitHub has requested CVE ID [CVE-2024-1908](https://www.cve.org/cverecord?id=CVE-2024-1908) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com/). - | - Packages have been updated to the latest security versions. + Packages have been updated to the latest security versions. bugs: - | Redundant messages caused increased log volumes in `/var/log/syslog`. @@ -49,5 +49,3 @@ sections: {% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %} - | {% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} diff --git a/data/release-notes/enterprise-server/3-10/9.yml b/data/release-notes/enterprise-server/3-10/9.yml index 56572de02c..99f8312c22 100644 --- a/data/release-notes/enterprise-server/3-10/9.yml +++ b/data/release-notes/enterprise-server/3-10/9.yml @@ -102,5 +102,3 @@ sections: {% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %} - | {% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} diff --git a/data/release-notes/enterprise-server/3-11/7.yml b/data/release-notes/enterprise-server/3-11/7.yml index 843f5a0cc0..5b643f2525 100644 --- a/data/release-notes/enterprise-server/3-11/7.yml +++ b/data/release-notes/enterprise-server/3-11/7.yml @@ -92,7 +92,3 @@ sections: {% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %} - | Pre-receive hooks which utilize `git rev-list` fail with an `fatal: Invalid revision range` error message. - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} diff --git a/data/release-notes/enterprise-server/3-12/1.yml b/data/release-notes/enterprise-server/3-12/1.yml index 5f1d6a1186..e862d553e1 100644 --- a/data/release-notes/enterprise-server/3-12/1.yml +++ b/data/release-notes/enterprise-server/3-12/1.yml @@ -114,5 +114,3 @@ sections: {% data reusables.release-notes.2023-11-cluster-ha-failover-git-push-failure %} - | {% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} diff --git a/data/release-notes/enterprise-server/3-9/11.yml b/data/release-notes/enterprise-server/3-9/11.yml index aafcdcc130..620cfef585 100644 --- a/data/release-notes/enterprise-server/3-9/11.yml +++ b/data/release-notes/enterprise-server/3-9/11.yml @@ -10,7 +10,7 @@ sections: - | **HIGH**: On an instance with GitHub Connect enabled and non-default settings for GitHub Connect configured, an attacker could use an enterprise GitHub Actions download token to fetch private repository data. This token is only accessible to users on the GitHub Enterprise Server instance. To fix this vulnerability, the Actions download token will now be a permissionless token. GitHub has requested CVE ID [CVE-2024-1908](https://www.cve.org/cverecord?id=CVE-2024-1908) for this vulnerability, which was reported via the [GitHub Bug Bounty program](https://bounty.github.com/). - | - Packages have been updated to the latest security versions. + Packages have been updated to the latest security versions. bugs: - | Redundant messages caused increased log volumes in `/var/log/syslog`. @@ -49,5 +49,3 @@ sections: {% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %} - | {% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %} diff --git a/data/release-notes/enterprise-server/3-9/12.yml b/data/release-notes/enterprise-server/3-9/12.yml index bd1fc10426..0dade7e773 100644 --- a/data/release-notes/enterprise-server/3-9/12.yml +++ b/data/release-notes/enterprise-server/3-9/12.yml @@ -98,5 +98,3 @@ sections: {% data reusables.release-notes.2023-12-backup-utils-exit-early-redis %} - | {% data reusables.release-notes.2024-01-haproxy-upgrade-causing-increased-errors %} - - | - {% data reusables.release-notes.2024-02-pages-deployment-error %}