Skip to content

Commit 7f2675c

Browse files
committed
GP-0 updated Whats New and Change History docs for 10.1.1 release
1 parent 7deec23 commit 7f2675c

File tree

2 files changed

+54
-31
lines changed

2 files changed

+54
-31
lines changed

Ghidra/Configurations/Public_Release/src/global/docs/ChangeHistory.html

+24
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,30 @@
77

88
<BODY>
99

10+
<H1 align="center">Ghidra 10.1.1 Change History (December 2021)</H1>
11+
<blockquote><p><u>Improvements</u></p>
12+
<ul>
13+
<li><I>Analysis</I>. Fixed headless analysis exception related to running UI code from the GNU Demangler analyzer. (GP-1613, Issue #3765)</li>
14+
<li><I>Basic Infrastructure</I>. Upgrade logging dependency to use <i>log4j</i> 2.17.0 (GP-1621)</li>
15+
<li><I>Debugger:Memory</I>. Added <B>New Memory Bytes View</B> to Window->Debugger menu. (GP-1465)</li>
16+
<li><I>Debugger:Memory</I>. Fixed issue with Debugger Memory view scrolling. (GP-1591)</li>
17+
<li><I>GUI</I>. Removed restriction that prevented renaming tree nodes while the tree is filtered. (GP-1507)</li>
18+
<li><I>GUI</I>. Fixed issue where renaming a symbol in the symbol tree could result in the symbol appearing more than once (under different organizational nodes) (GP-1587)</li>
19+
<li><I>Help</I>. Fixed NullPointerException when using the help system with animation disasbled. (GP-1612, Issue #3767)</li>
20+
</ul>
21+
</blockquote>
22+
<blockquote><p><u>Bugs</u></p>
23+
<ul>
24+
<li><I>Basic Infrastructure</I>. Fixed the <I>"ERROR StatusLogger Reconfiguration failed"</I> message that appeared in the log when Ghidra was launched with <I>support/ghidraDebug</I> script. (GP-1607)</li>
25+
<li><I>Debugger</I>. Fixed null pointer exception in Debugger when opening a program from a shared project. (GP-1490)</li>
26+
<li><I>Debugger</I>. Fixed issue with context menus on the trace selector tabs in Debugger Threads window. (GP-1494)</li>
27+
<li><I>Debugger</I>. Fix for font resizing (GP-1597, Issue #3752)</li>
28+
<li><I>Debugger</I>. Fixes null-pointer exceptions in lldb (GP-1600, Issue #3645)</li>
29+
<li><I>Debugger:Listing</I>. Fixed default configuration problem when cloning the Debugger Listing window. (GP-1479)</li>
30+
<li><I>Importer</I>. Fix issue importing NE binaries that have a segment number greater than 127. (GP-1576, Issue #3715)</li>
31+
</ul>
32+
</blockquote>
33+
1034
<H1 align="center">Ghidra 10.1 Change History (December 2021)</H1>
1135
<blockquote><p><u>New Features</u></p>
1236
<ul>

Ghidra/Configurations/Public_Release/src/global/docs/WhatsNew.html

+30-31
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ <H1>Ghidra: NSA Reverse Engineering Software</H2>
2626
Ghidra is a software reverse engineering (SRE) framework developed by NSA's Research Directorate.
2727
This framework includes a suite of full-featured, high-end software analysis tools that enable
2828
users to analyze compiled code on a variety of platforms including Windows, MacOS, and Linux.
29-
Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with
29+
Capabilities include disassembly, assembly, decompilation, debugging, emulation, graphing, and scripting, along with
3030
hundreds of other features. Ghidra supports a wide variety of processor instruction sets and
3131
executable formats and can be run in both user-interactive and automated modes. Users may also
3232
develop their own Ghidra plug-in components and/or scripts using the exposed API. In addition there are
@@ -41,45 +41,44 @@ <H1>Ghidra: NSA Reverse Engineering Software</H2>
4141
code and generating deep insights for NSA analysts who seek a better understanding of potential
4242
vulnerabilities in networks and systems.
4343
</P>
44+
<hr>
4445

45-
<H1>What's new in Ghidra 10.1</H1>
46-
47-
<H2>The not-so-fine print: Please Read!</H2>
48-
49-
<P><span style="color:#FF0000">WARNING:</span> There has been a published CVE security vulnerability noted in Ghidra dependencies within two log4j jar files.
50-
We strongly encourage anyone using previous versions of Ghidra or a build from source, to remediate this issue by either upgrading
51-
to the latest Ghidra 10.1 version, or patching your current version.</P>
46+
<H1><span style="color:#FF0000">Log4j Vulnerability Mitigation</span></H1>
47+
<p><span style="color:#FF0000">Please read!</span> There have been several
48+
published CVE security vulnerabilities noted for log4j which Ghidra uses for logging. The known issues
49+
have been resolved in log4j 2.17.0. We strongly encourage
50+
anyone using previous versions of Ghidra or a build from source, to remediate this issue by either upgrading
51+
to the latest Ghidra 10.1.1 version, or patching your current version.</P>
5252

5353
<P>
54-
To patch your current Ghidra installation, delete:
55-
<BLOCKQUOTE><UL>
56-
<li>Ghidra/Framework/Generic/lib/log4j-api-2.12.1.jar</li>
57-
<li>Ghidra/Framework/Generic/lib/log4j-core-2.12.1.jar</li>
58-
</UL></BLOCKQUOTE>
59-
</P>
54+
To patch your current Ghidra installation:
55+
56+
<BLOCKQUOTE>
57+
<UL>
58+
<li>Delete any log4j jar files in <b>Ghidra/Framework/Generic/lib</b>.</li>
59+
<li>Replace those jar files with the newer log4j 2.17.0 version: <b>log4j-api-2.17.0.jar</b> and <b>log4j-core-2.17.0.jar</b>.</li>
60+
<li>Update the log4j version to refer to 2.17.0 in <b>&ltinstall_dir&gt/Ghidra/Features/GhidraServer/data/classpath.frag</b>.</li></UL>
61+
</BLOCKQUOTE>
62+
</p>
6063

6164
<P>
62-
and replace with the newer log4j 2.15.0 version:
63-
<BLOCKQUOTE><UL>
64-
<li>log4j-api-2.15.0.jar</li>
65-
<li>log4j-core-2.15.0.jar</li>
65+
You can find these in the latest Ghidra 10.1.1 release, or from:
66+
<BLOCKQUOTE>
67+
<UL>
68+
<li>https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.17.0/log4j-api-2.17.0.jar</li>
69+
<li>https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.17.0/log4j-core-2.17.0.jar</li>
6670
</UL></BLOCKQUOTE>
67-
</P>
71+
</p>
6872

6973
<P>
70-
You can find these in the latest Ghidra 10.1 release, or from:
71-
<BLOCKQUOTE><UL>
72-
<li>https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.15.0/log4j-api-2.15.0.jar</li>
73-
<li>https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.15.0/log4j-core-2.15.0.jar</li>
74-
</UL></BLOCKQUOTE>
75-
</P>
74+
The details of the vulnerabilities can be found in the following:
75+
CVE-2021-44228, CVE-2021-45046, CVE-2021-45105.
76+
</p>
77+
<hr>
78+
79+
<H1>What's New in Ghidra 10.1</H1>
7680

77-
<P>
78-
The details of the vulnerability can be found here:
79-
<BLOCKQUOTE><UL>
80-
<li>https://nvd.nist.gov/vuln/detail/CVE-2021-44228</li>
81-
</UL></BLOCKQUOTE>
82-
</P>
81+
<H2>The not-so-fine print: Please Read!</H2>
8382

8483
<P>Ghidra 10.1 is fully backward compatible with project data from previous releases. However, programs and data type archives
8584
which are created or modified in 10.1 will not be useable by an earlier Ghidra version.</P>

0 commit comments

Comments
 (0)