Skip to content

formatting fixed for PSIRT intro #1187

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 3 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 3 additions & 4 deletions HowTos/Controller_and_Software_Release_Notes.rst
Original file line number Diff line number Diff line change
Expand Up @@ -37,14 +37,14 @@ Aviatrix releases features in private preview mode to offer you the opportunity
6.4.3057 (05/26/2022)
=======================

Issues Corrected in Aviatrix Release 6.4.3057
**Issues Corrected in Aviatrix Release 6.4.3057**

**AVI-2022-0002** – A vulnerability was discovered which could allow an unauthenticated attacker to run arbitrary commands against Aviatrix gateways. This is not known to be exploited.

6.5.3233 (05/26/2022)
=======================

Issues Corrected in Aviatrix Release 6.5.3233
**Issues Corrected in Aviatrix Release 6.5.3233**

- **AVI-2022-0002** – A vulnerability was discovered which could allow an unauthenticated attacker to run arbitrary commands against Aviatrix gateways. This is not known to be exploited.
- **AVX-10577** – Licensing metrics were not visible.
Expand All @@ -54,7 +54,7 @@ Issues Corrected in Aviatrix Release 6.5.3233
- **AVX-21332** – You can now use “insert_stateful_firewall_rules” API to insert stateful firewall rules, even when the table is empty.
- **AVX-22040** – Exception seen when disconnecting a firewall domain from Aviatrix edge domain on an AWS Transit Gateway.

Known Issues in Release 6.5.3233
**Known Issues in Release 6.5.3233**

- **AVX-22976** – When you roll back a non-AWS primary and HA gateway together in any of the following patterns, one of the rollbacks fails:

Expand Down Expand Up @@ -141,7 +141,6 @@ In releases prior to Controller 6.7, the term security domain was used to refer

**Known Issues in Aviatrix Release 6.7.1185**

- **AVI-2022-0002** – A vulnerability was discovered which could allow an unauthenticated attacker to run arbitrary commands against Aviatrix gateways. This is not known to be exploited.
- **AVX-22184** – When an Edge Gateway expires, its state is listed as “waiting” on the Upgrade page. This “waiting” Gateway prevents the Controller from successfully upgrading. The actual state of the edge is “Expired,” which is shown in the CloudN > List.

If an Edge Gateway is expired in your Controller, navigate to CloudN > List on the left sidebar. On the Registered Devices page, select the Edge Gateway with the state “waiting,” click the Diag dropdown menu, and select Reset Configuration. Then, your Controller can successfully upgrade.
Expand Down
8 changes: 4 additions & 4 deletions HowTos/security_bulletin_article.rst
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,10 @@ PSIRT Advisories
Aviatrix Product Security Team continually tests the software product, looking for vulnerabilities and weaknesses. If you have a security issue to report, please open a support ticket at Aviatrix Support Portal at https://support.aviatrix.com. Any such findings are fed back to Aviatrix's development teams and serious issues are described along with protective solutions in the advisories below.

Please note the below Aviatrix Security recommendations and communication plans:
- Aviatrix strongly recommend customers to stay on the latest release to resolve features and bug issues. All fixes are in the new release; we do not patch older release versions.
- Customers are strongly recommended to perform image migration 2x a year. The migration process provides the latest system level security patch
- All known software vulerabilities are submitted to Mitre for CVE-ID references by Aviatrix Systems
- Avitrix publish Field Notices and send alerts to Controller Admin in the Controller console when security related issues are published
- Aviatrix strongly recommend customers to stay on the latest release to resolve features and bug issues. All fixes are in the new release; we do not patch older release versions.
- Customers are strongly recommended to perform image migration 2x a year. The migration process provides the latest system level security patch
- All known software vulerabilities are submitted to Mitre for CVE-ID references by Aviatrix Systems
- Aviatrix publishes Field Notices and send alerts to Controller Admin in the Controller console when security related issues are published


Most Recent IR
Expand Down