[2.7] Update 2.7.2 release notes with CWE IDs for security fixes [skip ci]#4319
Open
chesterxgchen wants to merge 1 commit intoNVIDIA:2.7from
Open
[2.7] Update 2.7.2 release notes with CWE IDs for security fixes [skip ci]#4319chesterxgchen wants to merge 1 commit intoNVIDIA:2.7from
chesterxgchen wants to merge 1 commit intoNVIDIA:2.7from
Conversation
Add explicit CWE identifiers to the two security fixes in the 2.7.2 release notes so downstream users and scanners can correlate the fixes with standard vulnerability classifications. Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Contributor
Greptile SummaryUpdates the FLARE 2.7.2 release notes to add standard CWE identifiers and severity details for two security fixes that were previously documented without vulnerability classification.
Confidence Score: 5/5
Important Files Changed
Flowchart%%{init: {'theme': 'neutral'}}%%
flowchart TD
A["Release Notes Update"] --> B["CWE-502: FOBS RCE Fix"]
A --> C["CWE-22: FileRetriever Path Traversal Fix"]
B --> D["PR #4294/#4295"]
D --> E["Added BUILTIN_TYPES allowlist"]
D --> F["Validates type_name before load_class"]
D --> G["Public API: add_type_name_whitelist"]
C --> H["PR #4230 cherry-pick of #4229"]
H --> I["Path.resolve boundary checks"]
H --> J["Prevents ../ directory escape"]
Last reviewed commit: 74e633b |
Collaborator
Author
|
/build |
pcnudde
approved these changes
Mar 15, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
Updates the FLARE 2.7.2 release notes to add CWE identifiers for two security fixes that were previously undocumented or missing classification.
Changes
File:
docs/release_notes/flare_272.rstCWE-502 — Deserialization of Untrusted Data (PR #4294 / #4295, CVSS 8.8 High)
Added an explicit security entry for the FOBS RCE fix. The previous release notes only mentioned "Improved error handling in FOBS serialization" which did not reflect the severity or nature of the vulnerability. The fix introduced a
BUILTIN_TYPESallowlist to validatetype_namebefore passing it toload_class(), blocking authenticated participants from achieving RCE on the aggregation server.CWE-22 — Path Traversal (PR #4230, cherry-pick of #4229)
Updated the existing
FileRetrieverentry to include the CWE-22 identifier and clarify the attack vector (../traversal escaping the allowed directory).Why
Downstream users, security scanners, and compliance teams rely on CWE IDs to correlate release notes with standard vulnerability classifications. Without these IDs the fixes are effectively invisible to automated tooling.
Types of Changes
🤖 Generated with Claude Code