Skip to content
This repository has been archived by the owner on May 30, 2024. It is now read-only.

Bump SnakeYAML from 1.19 to 1.26 to address CVE-2017-18640 #207

Merged
merged 1 commit into from
Sep 3, 2020

Conversation

ssrm
Copy link
Contributor

@ssrm ssrm commented Sep 2, 2020

Requirements

  • I have added test coverage for new or changed functionality
  • I have followed the repository's pull request submission guidelines
  • I have validated my changes against all supported platform versions

Related issues

https://nvd.nist.gov/vuln/detail/CVE-2017-18640

Describe the solution you've provided

Snakeyaml has security vulnerability in 1.19 which is fixed in 1.26

Describe alternatives you've considered

Provide a clear and concise description of any alternative solutions or features you've considered.

Additional context

Add any other context about the pull request here.

@gwhelanLD gwhelanLD changed the title Snakeyaml has security vulnerability in 1.19 which is fixed in 1.26 Bump SnakeYAML from 1.19 to 1.26 to address CVE-2017-18640 Sep 3, 2020
@gwhelanLD gwhelanLD merged commit 6c87a65 into launchdarkly:master Sep 3, 2020
@gwhelanLD
Copy link
Contributor

We'll put this out in the 5.0.5 release. To clarify for anyone taking a look at the PR, the SDK only parses YAML if the application has configured the SDK with a flag data file. It's unlikely CVE-2017-18640 would affect SDK usage as it requires configuration and access to a local file.

Thanks for the PR,
@gwhelanLD

LaunchDarklyCI pushed a commit that referenced this pull request Sep 3, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants