Back to bug 2216588

Who When What Removed Added
Anten Skrabec 2023-06-21 23:52:44 UTC Blocks 2216589
Anten Skrabec 2023-06-22 00:15:33 UTC Alias TRIAGE-CVE-2023-3361
Summary odh-dashboard: s3 credentials included when exporting elyra notebook TRIAGE-CVE-2023-3361 odh-dashboard: s3 credentials included when exporting elyra notebook
Anten Skrabec 2023-06-22 00:58:56 UTC Summary TRIAGE-CVE-2023-3361 odh-dashboard: s3 credentials included when exporting elyra notebook CVE-2023-3361 TRIAGE-CVE-2023-3361 odh-dashboard: s3 credentials included when exporting elyra notebook
Alias TRIAGE-CVE-2023-3361 CVE-2023-3361
RaTasha Tillery-Smith 2023-06-22 12:12:07 UTC Flags needinfo?(askrabec)
Anten Skrabec 2023-06-22 17:53:21 UTC Summary CVE-2023-3361 TRIAGE-CVE-2023-3361 odh-dashboard: s3 credentials included when exporting elyra notebook CVE-2023-3361 odh-dashboard: s3 credentials included when exporting elyra notebook
Anten Skrabec 2023-06-22 18:00:11 UTC CC rtillery
Flags needinfo?(askrabec) needinfo?(rtillery)
RaTasha Tillery-Smith 2023-06-22 19:43:03 UTC Doc Text A flaw was found in Red Hat OpenShift Data Science where when exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output. A flaw was found in Red Hat OpenShift Data Science. When exporting a pipeline from the Elyra notebook pipeline editor as Python DSL or YAML, it reads S3 credentials from the cluster (ds pipeline server) and saves them in plain text in the generated output instead of an ID for a Kubernetes secret.
CC rtillery
Anten Skrabec 2023-06-26 19:01:06 UTC Flags needinfo?(rtillery)
Red Hat Bugzilla 2023-07-07 08:32:57 UTC Assignee security-response-team nobody

Back to bug 2216588