You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 30, 2024. It is now read-only.
Describe the bug
Launchdarkly java-server-sdk build.gradle has a dependency on SnakeYaml 1.32. That contains CVE-2022-1471. SnakeYaml 2.0 fixes it.
To reproduce
Run a CVE scanner like OWASP dependencyCheck. It will flag this library, for example launchdarkly-java-server-sdk-6.0.5.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml (pkg:maven/org.yaml/[email protected], cpe:2.3:a:snakeyaml_project:snakeyaml:1.32:*:*:*:*:*:*:*) : CVE-2022-1471
Expected behavior
Using the LaunchDarkly java server SDK library shouldn't introduce a transitive SnakeYaml dependency that has a CVE.
Describe the bug
Launchdarkly java-server-sdk build.gradle has a dependency on SnakeYaml 1.32. That contains CVE-2022-1471. SnakeYaml 2.0 fixes it.
To reproduce
Run a CVE scanner like OWASP dependencyCheck. It will flag this library, for example
launchdarkly-java-server-sdk-6.0.5.jar/META-INF/maven/org.yaml/snakeyaml/pom.xml (pkg:maven/org.yaml/[email protected], cpe:2.3:a:snakeyaml_project:snakeyaml:1.32:*:*:*:*:*:*:*) : CVE-2022-1471
Expected behavior
Using the LaunchDarkly java server SDK library shouldn't introduce a transitive SnakeYaml dependency that has a CVE.
SDK version
6.0.5
Language version, developer tools
Java 17
OS/platform
Ubuntu 22
Additional context
See https://nvd.nist.gov/vuln/detail/CVE-2022-1471 and https://bitbucket.org/snakeyaml/snakeyaml/wiki/Changes
The text was updated successfully, but these errors were encountered: