-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade commons-text-1.9.jar #892
Comments
@datenimperator @martinlippert we have switched to a snapshot of |
I find it unlikely that we'd be affected by CVE-2022-42889. The lib
|
@datenimperator Please feel free to report the usage of the CVE-effected dependency to the |
@BoykoAlex @martinlippert thx for responding so quickly, really appreciated. Personally, I do not assume that this is so much of an actual issue, given the way how the lib is used. But this warning comes up if your computer is scanned for vulnerabilities, and many organizations (like my employer) will perform such scans. I think its safe to assume that this warning has been seen already by lots of users. Once your PC has been on a "vulnerable computers" list for some days, it doesn't take too long until emails from top-execs come flying in... So, for the sake of you helping me to get rid of our sec guy telling me to update, I eagerly await the next release :-) |
Done, see openrewrite/rewrite-maven-plugin#438 |
@datenimperator ETA for the next release is the week of Dec 7 |
|
Thanks again @datenimperator for reporting this!!! |
Describe the bug
The VScode extension
pivotal.vscode-spring-boot-1.40.0
includes the filelanguage-server\BOOT-INF\lib\commons-text-1.9.jar
. A critical security issue is reported as CVE-2022-42889 for this release. This error has been fixed in releases 1.10.0 and higher.Please update the dependency to one not vulnerable.
To Reproduce
%HOME%\.vscode\extensions\pivotal.vscode-spring-boot-1.40.0\language-server\BOOT-INF\lib
to find the vulnerable jar file.The text was updated successfully, but these errors were encountered: