You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Running a Trivy vulnerabilities scan through the Spring Cloud Skipper container image returned some CVEs affecting the latest SNAPSHOT release, 2.11.0-SNAPSHOT, that I couldn't find any info on:
spring-cloud-skipper 2.11.0-SNAPSHOT is now part of the mono-repo spring-cloud-dataflow.
The main branch here represents 2.10.4-SNAPSHOT.
CVE-2022-45868 is unavoidable because we include H2 driver for demonstration purposes. We don't advise anyone using it in a production environment.
CVE-2016-1000027 is mitigated because we only accept application/json in POST requests. It requires accepting and expecting to deserialize a Java Object.
Thanks a lot for the detailed response @corneil! If it is okay with you, I'll use this issue to report a few new CVEs from a vulnerability scan I recently run:
Hi team,
Running a Trivy vulnerabilities scan through the Spring Cloud Skipper container image returned some CVEs affecting the latest
SNAPSHOT
release,2.11.0-SNAPSHOT
, that I couldn't find any info on:h2databse
json-smart
spring-web
Could you confirm whether the Skipper is affected by these vulnerabilities and if so, are there plans to update the related dependencies?
Steps to reproduce:
The text was updated successfully, but these errors were encountered: