-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Snyk] Fix for 4 vulnerabilities #352
base: master
Are you sure you want to change the base?
Conversation
…lnerabilities The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHECXF-8648831 - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-8523186 - https://snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-8547999 - https://snyk.io/vuln/SNYK-JAVA-CHQOSLOGBACK-8539867
Reviewer's Guide by SourceryThis pull request upgrades multiple dependencies in the pom.xml file to address several vulnerabilities, including Denial of Service and Time-of-check Time-of-use Race Condition issues. The primary change involves updating the cxf-version property, which cascades to other related dependencies. No diagrams generated as the changes look simple and do not need a visual representation. File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have skipped reviewing this pull request. Here's why:
- It seems to have been created by a bot ('[Snyk]' found in title). We assume it knows what it's doing!
- We don't review packaging changes - Let us know if you'd like us to change this.
Updated dependencies detected. Learn more about Socket for GitHub ↗︎
|
Snyk has created this PR to fix 4 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
samples/server/petstore/jaxrs-cxf-test-data/pom.xml
Vulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-ORGAPACHECXF-8648831
3.3.0
->3.5.10
org.apache.cxf:cxf-rt-ws-policy:
3.3.0
->3.5.10
org.apache.cxf:cxf-rt-wsdl:
3.3.0
->3.5.10
org.apache.cxf:cxf-spring-boot-starter-jaxrs:
3.3.0
->3.5.10
No Known Exploit
SNYK-JAVA-ORGAPACHETOMCATEMBED-8523186
Major version upgrade
No Known Exploit
SNYK-JAVA-ORGAPACHETOMCATEMBED-8547999
Major version upgrade
No Known Exploit
SNYK-JAVA-CHQOSLOGBACK-8539867
Major version upgrade
No Known Exploit
Vulnerabilities that could not be fixed
org.springframework.boot:[email protected]
toorg.springframework.boot:[email protected]
; Reasoncould not apply upgrade, dependency is managed externally
; Location:https://maven-central.storage-download.googleapis.com/maven2/org/springframework/boot/spring-boot-dependencies/2.7.15/spring-boot-dependencies-2.7.15.pom
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Denial of Service (DoS)
Summary by Sourcery
Upgrade CXF from 3.3.0 to 3.5.10 to address vulnerabilities.
Bug Fixes: