Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: dependency convergence error from copilot (#6998) #7000

Merged
merged 1 commit into from
Nov 14, 2024
Merged

Conversation

ZheSun88
Copy link
Contributor

  • dependency convergence : there two different versions of io.netty:netty-* in this reactor-netty:1.2.0 , which are 4.1.114 and 4.1.113
  • vulnerable dependency : the reactor-netty:1.2.0 uses io.netty:netty-common:4.1.114 which contains GHSA-xq3w-v528-46rv

- `dependency convergence` : there two different versions of io.netty:netty-* in this reactor-netty:1.2.0 , which are 4.1.114 and 4.1.113
- `vulnerable dependency` : the reactor-netty:1.2.0 uses io.netty:netty-common:4.1.114 which contains GHSA-xq3w-v528-46rv
@ZheSun88 ZheSun88 enabled auto-merge (squash) November 14, 2024 10:22
Copy link

Dependencies Report

  • 🟠 Known Vulnerabilities:

    • Vulnerabilities in: pkg:npm/[email protected] [CVE-2024-34394, CVE-2024-34393] (osv-scan)
      👌 This is coming from the tools, @cyclonedx/cyclonedx, we have used for sbom module, FP for us.
      ·
    • Vulnerabilities in: pkg:npm/[email protected] [CVE-2024-45296] (osv-scan)
      👌 From vaadin-rounte:1.7.5. Very low impact for us since we're only running that code in the user's browser and the only impact is a degraded performance.
      ·
    • Vulnerabilities in: pkg:maven/com.fasterxml.jackson.core/[email protected] [CVE-2023-35116] (owasp)
      👌 Not a valid CVE report based on the vendor analysis and research
      · cpe:2.3:a:fasterxml:jackson-databind::::::::
    • Vulnerabilities in: pkg:maven/me.friwi/jcef-api@jcef-99c2f7a%2Bcef-127.3.1%2Bg6cbb30e%2Bchromium-127.0.6533.100 [CVE-2024-21639, CVE-2024-21640] (owasp)
      👌 Wait for the update from the jcefmaven community. Meanwhile the swing-kit is supposed to be used with fixed websites and not to browse the internet, we have a check for that, so the only possible attacker would be the same person that created the swing application, aka our customer devs. so this vulnerability is not classified by us as critical issue
      · cpe:2.3:a:chromiumembedded:chromium_embedded_framework::::::::
  • 📔 No License Issues

[Click for more Details]

@ZheSun88 ZheSun88 merged commit 2a11bfb into 24.4 Nov 14, 2024
3 checks passed
@ZheSun88 ZheSun88 deleted the pick-6998-24.4 branch November 14, 2024 10:28
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants