Skip to content

Conversation

julianladisch
Copy link
Contributor

Upgrade Spring and Spring Boot to the latest patch version for the given minor version.

This upgrades several vulnerable dependencies:

json-smart from 2.4.8 to 2.4.10 fixing Denial of Service (DoS): https://nvd.nist.gov/vuln/detail/CVE-2023-1370

snakeyaml from 1.17 to 1.33 fixing Denial of Service (DoS), Arbitrary Code Execution and Stack-based Buffer Overflow: https://nvd.nist.gov/vuln/detail/CVE-2017-18640
https://nvd.nist.gov/vuln/detail/CVE-2022-25857
https://nvd.nist.gov/vuln/detail/CVE-2022-1471
https://nvd.nist.gov/vuln/detail/CVE-2022-38751
https://nvd.nist.gov/vuln/detail/CVE-2022-38752

spring-expression from 5.3.24 to 5.3.26 fixing
Allocation of Resources Without Limits or Throttling: https://nvd.nist.gov/vuln/detail/CVE-2023-20861

Upgrade Spring and Spring Boot to the latest patch version
for the given minor version.

This upgrades several vulnerable dependencies:

json-smart from 2.4.8 to 2.4.10 fixing Denial of Service (DoS):
https://nvd.nist.gov/vuln/detail/CVE-2023-1370

snakeyaml from 1.17 to 1.33 fixing Denial of Service (DoS),
Arbitrary Code Execution and Stack-based Buffer Overflow:
https://nvd.nist.gov/vuln/detail/CVE-2017-18640
https://nvd.nist.gov/vuln/detail/CVE-2022-25857
https://nvd.nist.gov/vuln/detail/CVE-2022-1471
https://nvd.nist.gov/vuln/detail/CVE-2022-38751
https://nvd.nist.gov/vuln/detail/CVE-2022-38752

spring-expression from 5.3.24 to 5.3.26 fixing
Allocation of Resources Without Limits or Throttling:
https://nvd.nist.gov/vuln/detail/CVE-2023-20861
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant