Skip to content

Conversation

@rachaelshaw
Copy link
Member

WIP for #23899

Comment on lines 51 to 56
- name: Engineering department
description: "Hosts with end users in engineering"
type: Host vitals
criteria:
vital: end_user_idp_department
value: Engineering
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dev note

TODO

FUTURE

This is how more complex criteria could look in the future:

  name: Engineering department or IT admins who are named Ricky
  description: Hosts with end users in engineering or who are IT admins named Ricky
  type: Host vitals
  criteria:
    or:  
      - and:
        - vital: end_user_idp_groups
        - value: IT admins
        - vital: end_user_first_name
        - value: Ricky
      - vital: end_user_idp_department
        value: Engineering

Comment on lines +51 to +56
- name: Engineering department
description: "Hosts with end users in engineering"
type: host_vitals
criteria:
vital: end_user_idp_department
value: Engineering
Copy link
Member Author

@rachaelshaw rachaelshaw Jun 13, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Dev note

TODO

FUTURE

This is how more complex criteria could look in the future:

  name: Engineering department or IT admins who are named Ricky
  description: Hosts with end users in engineering or who are IT admins named Ricky
  type: Host vitals
  criteria:
    or:  
      - and:
        - vital: end_user_idp_groups
          value: IT admins
        - vital: end_user_first_name
          value: Ricky
      - vital: end_user_idp_department
        value: Engineering

getvictor and others added 11 commits June 13, 2025 12:27
Fixes CVE-2025-22874 reported by
https://github.com/fleetdm/fleet/actions/runs/15601368321/job/43941793647.

(IMO not a critical CVE, so it doesn't need to be cherry-picked into
v4.69.0.)

Added automation to make this easier next time.
…29975)

Fixes #29973

Tests are failing due to infra issues with https://proxy.golang.org

# Checklist for submitter
- [x] Manual QA for all new/changed functionality
Closes: #30000 

Changes:
- Updated the version of node used by the website to `^20.18`
For #29323 , contributor docs changes only (follow-up to
#29555).
More work to fix #29720.

---------

Co-authored-by: Noah Talerman <47070608+noahtalerman@users.noreply.github.com>
eashaw and others added 10 commits June 13, 2025 15:15
…30003)

Changes:
- Updated the return value of the create-historical-event helper.
- Added a package that installs Fleet's Keynote theme and related fonts
to self-service
related to: #30005

Changes:
- Compressed and resized large gifs in the "Preventing Mistakes with
GitOps" article
- Removed unused website assets
…ing that hash exists in Fleet (#29866)

Updated documentation to be more clear on behavior if hash is provided
for software package in YAML.
This PR adds VEX statement files for three vulverabilities:

```
┌─────────┬────────────────┬──────────┬──────────┬─────────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability  │ Severity │  Status  │    Installed Version    │ Fixed Version │                            Title                             │
├─────────┼────────────────┼──────────┼──────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libxml2 │ CVE-2025-49794 │ CRITICAL │ affected │ 2.9.14+dfsg-1.3~deb12u1 │               │ libxml: Heap use after free (UAF) leads to Denial of service │
│         │                │          │          │                         │               │ (DoS)...                                                     │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49794                   │
│         ├────────────────┤          │          │                         ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-49795 │          │          │                         │               │ libxml: Null pointer dereference leads to Denial of service  │
│         │                │          │          │                         │               │ (DoS)                                                        │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49795                   │
│         ├────────────────┤          │          │                         ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-49796 │          │          │                         │               │ libxml: Type confusion leads to Denial of service (DoS)      │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49796                   │
└─────────┴────────────────┴──────────┴──────────┴─────────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘
```

the vulnerabilities in libxml2 do not affect fleetctl, since the attack
vector is DoS and fleetctl is not a server tool. Additionally the
libxml2 package isn't used by fleetctl directly, but by the tools it
uses for code signing, which don't parse untrusted XML.
Related to:

- #29789

---------

Co-authored-by: Rachael Shaw <r@rachael.wtf>
@codecov
Copy link

codecov bot commented Jun 13, 2025

Codecov Report

Attention: Patch coverage is 38.46154% with 24 lines in your changes missing coverage. Please review.

Project coverage is 64.10%. Comparing base (f238292) to head (55b21fb).
Report is 28 commits behind head on docs-v4.71.0.

Files with missing lines Patch % Lines
cmd/osquery-perf/agent.go 0.00% 24 Missing ⚠️
Additional details and impacted files
@@               Coverage Diff                @@
##           docs-v4.71.0   #29992      +/-   ##
================================================
+ Coverage         60.45%   64.10%   +3.65%     
================================================
  Files              1865     1865              
  Lines            182331   182345      +14     
  Branches           5255     5332      +77     
================================================
+ Hits             110232   116897    +6665     
+ Misses            63496    56246    -7250     
- Partials           8603     9202     +599     
Flag Coverage Δ
backend 65.04% <38.46%> (+4.02%) ⬆️
frontend 53.89% <ø> (-0.04%) ⬇️

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.
  • 📦 JS Bundle Analysis: Save yourself from yourself by tracking and limiting bundle sizes in JS merges.

@rachaelshaw
Copy link
Member Author

Merged in main, now the diff is unwieldy. Making a new PR 🤦‍♀️

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.