diff --git a/scripts/generateAndCheckSBOM.js b/scripts/generateAndCheckSBOM.js index f2cc378c9..953e614f5 100755 --- a/scripts/generateAndCheckSBOM.js +++ b/scripts/generateAndCheckSBOM.js @@ -58,7 +58,7 @@ const cveWhiteList = { cves: ['CVE-2023-35116'], description: 'Not a valid CVE report based on the vendor analysis and [research](https://github.com/FasterXML/jackson-databind/issues/3972)' }, - 'pkg:maven/me.friwi/jcef-api@jcef-af53d63%2Bcef-104.4.23%2Bg46ae630%2Bchromium-104.0.5112.102' : { + 'pkg:maven/me.friwi/jcef-api@jcef-99c2f7a%2Bcef-127.3.1%2Bg6cbb30e%2Bchromium-127.0.6533.100' : { cves: ['CVE-2024-21639', 'CVE-2024-21640'], description: 'Wait for the update from the jcefmaven community. Meanwhile the swing-kit is supposed to be used with fixed websites and not to browse the internet, we have a check for that, so the only possible attacker would be the same person that created the swing application, aka our customer devs. so this vulnerability is not classified by us as critical issue' }, diff --git a/versions.json b/versions.json index d285eddd6..a6c7e6201 100644 --- a/versions.json +++ b/versions.json @@ -405,7 +405,7 @@ "jsVersion": "3.0.0" }, "swing-kit": { - "javaVersion": "2.2.3" + "javaVersion": "2.3.0" }, "vaadin-collaboration-engine": { "javaVersion": "6.3.0"