From 16c79f774653882bc3e7f27ef48ffaeec3f50ccb Mon Sep 17 00:00:00 2001 From: dilip Date: Wed, 6 Mar 2024 20:21:09 +0530 Subject: [PATCH] release 4.8.6 --- charts/cdefense/Chart.yaml | 4 ++-- charts/cdefense/values.yaml | 4 ++-- release.md | 22 +++++++++++++++------- 3 files changed, 19 insertions(+), 11 deletions(-) diff --git a/charts/cdefense/Chart.yaml b/charts/cdefense/Chart.yaml index dc0c45a..5ed2a4f 100755 --- a/charts/cdefense/Chart.yaml +++ b/charts/cdefense/Chart.yaml @@ -13,9 +13,9 @@ type: application # This is the chart version. This version number should be incremented each time you make changes # to the chart and its templates, including the app version. # Versions are expected to follow Semantic Versioning (https://semver.org/) -version: 4.8.5 +version: 4.8.6 # This is the version number of the application being deployed. This version number should be # incremented each time you make changes to the application. Versions are not expected to # follow Semantic Versioning. They should reflect the version the application is using. # It is recommended to use it with quotes. -appVersion: "4.8.5" +appVersion: "4.8.6" diff --git a/charts/cdefense/values.yaml b/charts/cdefense/values.yaml index 7272fde..aec7840 100644 --- a/charts/cdefense/values.yaml +++ b/charts/cdefense/values.yaml @@ -1,4 +1,4 @@ -version: "release-4.8.5" +version: "release-4.8.6" domain: clouddefenseai.com hostname: cdefense.clouddefenseai.com @@ -194,7 +194,7 @@ web: tolerations: [] replicas: 1 image: cdefense/webconsole - version: "release-4.8.5" + version: "release-4.8.6" service: type: NodePort ports: diff --git a/release.md b/release.md index c85c33d..d2e5b23 100644 --- a/release.md +++ b/release.md @@ -1,11 +1,19 @@ -Release Date : 23.01.2024 -Release Notes : 4.8.5 +Release Date : 06.03.2024 +Release Notes : 4.8.6 New feature list: -1) CLI Scan Default Branch Option: We have introduced a new option for the CLI scan, allowing users to instantly set a branch as the default. This feature enhances the flexibility and efficiency of the CLI scanning process. -2) Enhanced SCA Results Sorting: In a significant update to our SCA (Software Composition Analysis) feature, vulnerabilities within the same severity level are now sorted based on their exploitability. This new sorting methodology provides a more nuanced and practical view of the vulnerabilities, helping users prioritize their remediation efforts more effectively. +1) Import Logs Functionality on Organizational Level: We have made the import logs to show information for all Organization if `all teams` selector is enabled. +2) New Field Addition on Application Page: We have included the last scan of the current branch and the last scan in the app with the branch name under the Application page. +3) CTO Report TeamName: Added team name to CTO report. +4) CTO Report False Positive: Added False positive column under CTO report. +5) Time Series Graph: Updated time series graph with below 3 legends on daily basis, weekly basis, monthly basis, quarterly basis + - Open Vulnerability trend + - New Vulnerability Identified trend + - Closed/Fixed Vulnerability +6) Generate report for 30 days and 60 days +7) Updates Team admin acess role: Team admin can now invite new user/existing team member to any team. Improvements: -1) Fixed Vulnerability Dashboard Display Issue: We have resolved an issue affecting the proper display of the Vulnerability Dashboard. Users can now expect an accurate and user-friendly interface for monitoring their system's security status. -2) Corrected JS SCA Scan for Yarn Files: Fixed a problem where the JavaScript SCA (Software Composition Analysis) was not functioning correctly during the scanning of yarn files. This correction ensures more accurate and reliable vulnerability detection in JavaScript projects using yarn. -3) Updated Dependency Search in GoLang: The dependency search mechanism in GoLang has been updated, significantly speeding up the scanning process. This improvement enhances the performance and efficiency of GoLang scans, reducing the time and resources required for comprehensive security assessments. +1) Fixed Audit Log Search By date Filter: We have resolved audit log search on date filter. +2) Fixed the issue with parallel execution of scans: Fixed the CloudDefense processes hang issues with parallel execution of scans. +3) Fixed Ruby still has false positives: Fixed false positive in the Ruby Gemfile.lock. \ No newline at end of file