Skip to content

[2.7] Update 2.7.2 release notes with CWE IDs for security fixes [skip ci]#4319

Merged
chesterxgchen merged 1 commit intoNVIDIA:2.7from
chesterxgchen:release-notes-272-security-cwe
Mar 16, 2026
Merged

[2.7] Update 2.7.2 release notes with CWE IDs for security fixes [skip ci]#4319
chesterxgchen merged 1 commit intoNVIDIA:2.7from
chesterxgchen:release-notes-272-security-cwe

Conversation

@chesterxgchen
Copy link
Collaborator

Summary

Updates the FLARE 2.7.2 release notes to add CWE identifiers for two security fixes that were previously undocumented or missing classification.

Changes

File: docs/release_notes/flare_272.rst

CWE-502 — Deserialization of Untrusted Data (PR #4294 / #4295, CVSS 8.8 High)

Added an explicit security entry for the FOBS RCE fix. The previous release notes only mentioned "Improved error handling in FOBS serialization" which did not reflect the severity or nature of the vulnerability. The fix introduced a BUILTIN_TYPES allowlist to validate type_name before passing it to load_class(), blocking authenticated participants from achieving RCE on the aggregation server.

CWE-22 — Path Traversal (PR #4230, cherry-pick of #4229)

Updated the existing FileRetriever entry to include the CWE-22 identifier and clarify the attack vector (../ traversal escaping the allowed directory).

Why

Downstream users, security scanners, and compliance teams rely on CWE IDs to correlate release notes with standard vulnerability classifications. Without these IDs the fixes are effectively invisible to automated tooling.

Types of Changes

  • Non-breaking change (documentation only)

🤖 Generated with Claude Code

Add explicit CWE identifiers to the two security fixes in the 2.7.2
release notes so downstream users and scanners can correlate the fixes
with standard vulnerability classifications.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
@chesterxgchen chesterxgchen changed the title [2.7] Update 2.7.2 release notes with CWE IDs for security fixes [2.7] Update 2.7.2 release notes with CWE IDs for security fixes [skip ci] Mar 15, 2026
@greptile-apps
Copy link
Contributor

greptile-apps bot commented Mar 15, 2026

Greptile Summary

Updates the FLARE 2.7.2 release notes to add standard CWE identifiers and severity details for two security fixes that were previously documented without vulnerability classification.

Confidence Score: 5/5

  • This PR is safe to merge — it only modifies release notes documentation with no code changes.
  • Documentation-only change to an RST release notes file. The security descriptions were verified against the actual codebase and accurately reflect the implemented fixes. No code logic, configuration, or build changes are involved.
  • No files require special attention.

Important Files Changed

Filename Overview
docs/release_notes/flare_272.rst Adds CWE-502 (FOBS RCE) and CWE-22 (FileRetriever path traversal) security identifiers to bug fix entries. Both entries accurately describe the vulnerabilities and fixes verified against the codebase.

Flowchart

%%{init: {'theme': 'neutral'}}%%
flowchart TD
    A["Release Notes Update"] --> B["CWE-502: FOBS RCE Fix"]
    A --> C["CWE-22: FileRetriever Path Traversal Fix"]
    B --> D["PR #4294/#4295"]
    D --> E["Added BUILTIN_TYPES allowlist"]
    D --> F["Validates type_name before load_class"]
    D --> G["Public API: add_type_name_whitelist"]
    C --> H["PR #4230 cherry-pick of #4229"]
    H --> I["Path.resolve boundary checks"]
    H --> J["Prevents ../ directory escape"]
Loading

Last reviewed commit: 74e633b

@chesterxgchen
Copy link
Collaborator Author

/build

@chesterxgchen chesterxgchen merged commit 0514831 into NVIDIA:2.7 Mar 16, 2026
19 checks passed
nvidianz pushed a commit to nvidianz/NVFlare that referenced this pull request Mar 18, 2026
…p ci] (NVIDIA#4319)

## Summary

Updates the FLARE 2.7.2 release notes to add CWE identifiers for two
security fixes that were previously undocumented or missing
classification.

## Changes

**File:** `docs/release_notes/flare_272.rst`

### CWE-502 — Deserialization of Untrusted Data (PR NVIDIA#4294 / NVIDIA#4295, CVSS
8.8 High)

Added an explicit security entry for the FOBS RCE fix. The previous
release notes only mentioned "Improved error handling in FOBS
serialization" which did not reflect the severity or nature of the
vulnerability. The fix introduced a ``BUILTIN_TYPES`` allowlist to
validate ``type_name`` before passing it to ``load_class()``, blocking
authenticated participants from achieving RCE on the aggregation server.

### CWE-22 — Path Traversal (PR NVIDIA#4230, cherry-pick of NVIDIA#4229)

Updated the existing ``FileRetriever`` entry to include the CWE-22
identifier and clarify the attack vector (``../`` traversal escaping the
allowed directory).

## Why

Downstream users, security scanners, and compliance teams rely on CWE
IDs to correlate release notes with standard vulnerability
classifications. Without these IDs the fixes are effectively invisible
to automated tooling.

## Types of Changes

- [x] Non-breaking change (documentation only)

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants