-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Mapper Creation Course #155
base: main
Are you sure you want to change the base?
Conversation
charleshu-8
commented
Jun 10, 2024
•
edited
Loading
edited
- OHDF mapper creation course addition.
Signed-off-by: Charles Hu <[email protected]>
✅ Deploy Preview for mitre-saf-training ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
…raining into mapperCreationCourse
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
…raining into mapperCreationCourse
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Ryan Y. Lin <[email protected]>
Signed-off-by: Ryan Y. Lin <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Signed-off-by: Charles Hu <[email protected]>
Hand-off info listed in issue here: #174 |
Signed-off-by: Charles Hu <[email protected]>
Stale pull request message |
Copilot
AI
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Copilot reviewed 20 out of 31 changed files in this pull request and generated 3 suggestions.
Files not reviewed (11)
- src/courses/mappers/02.md: Evaluated as low risk
- src/courses/mappers/05.md: Evaluated as low risk
- src/courses/mappers/07.md: Evaluated as low risk
- src/courses/mappers/08.md: Evaluated as low risk
- src/courses/mappers/09.md: Evaluated as low risk
- src/README.md: Evaluated as low risk
- src/.vuepress/navbar.ts: Evaluated as low risk
- src/.vuepress/sidebar.ts: Evaluated as low risk
- src/courses/mappers/16.md: Evaluated as low risk
- src/courses/mappers/04.md: Evaluated as low risk
- src/courses/mappers/15.md: Evaluated as low risk
Comments skipped due to low confidence (3)
src/courses/mappers/README.md:13
- The number '2' should be written out as 'two' for consistency.
The class is split into 2 sections.
src/courses/mappers/README.md:22
- The use of the backslash before the asterisk might be unnecessary and could be removed for clarity.
Create a \*-to-OHDF mapper.
src/courses/mappers/14.md:138
- The word 'accomodate' is misspelled. It should be 'accommodate'.
accomodate
"id": "CVE-2021-43529", | ||
"status": "affected", | ||
"cvss": 9.8, | ||
"description": "DOCUMENTATION: A remote code execution flaw was found in the way NSS verifies certificates. This flaw allows an attacker posing as an SSL/TLS server to trigger this issue in a client application compiled with NSS when it tries to initiate an SSL/TLS connection. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client, triggering the flaw. The highest threat to this vulnerability is confidentiality, integrity, as well as system availability. STATEMENT: The issue is not limited to TLS. Any applications that use NSS certificate verification are vulnerable; S/MIME is impacted as well. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client. Firefox is not vulnerable to this flaw as it uses the mozilla::pkix for certificate verification. Thunderbird is affected when parsing email with the S/MIME signature. Thunderbird on Red Hat Enterprise Linux 8.4 and later does not need to be updated since it uses the system NSS library, but earlier Red Hat Enterprise Linux 8 extended life streams will need to update Thunderbird as well as NSS. MITIGATION: Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affec", |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The description field for the vulnerability is truncated. It ends abruptly with 'Please update the affec'.
"description": "DOCUMENTATION: A remote code execution flaw was found in the way NSS verifies certificates. This flaw allows an attacker posing as an SSL/TLS server to trigger this issue in a client application compiled with NSS when it tries to initiate an SSL/TLS connection. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client, triggering the flaw. The highest threat to this vulnerability is confidentiality, integrity, as well as system availability. STATEMENT: The issue is not limited to TLS. Any applications that use NSS certificate verification are vulnerable; S/MIME is impacted as well. Similarly, a server application compiled with NSS, which processes client certificates, can receive a malicious certificate via a client. Firefox is not vulnerable to this flaw as it uses the mozilla::pkix for certificate verification. Thunderbird is affected when parsing email with the S/MIME signature. Thunderbird on Red Hat Enterprise Linux 8.4 and later does not need to be updated since it uses the system NSS library, but earlier Red Hat Enterprise Linux 8 extended life streams will need to update Thunderbird as well as NSS. MITIGATION: Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affec", | |
"affecting applications. Please update the affected packages to mitigate this vulnerability." |
Copilot is powered by AI, so mistakes are possible. Review output carefully before use.
Co-authored-by: Copilot <[email protected]> Signed-off-by: Aaron Lippold <[email protected]>
Co-authored-by: Copilot <[email protected]> Signed-off-by: Aaron Lippold <[email protected]>