+1

On Fri, Apr 10, 2020 at 11:16 AM Owen Nichols <onich...@pivotal.io> wrote:

> Recently it’s been noticed that spring-core-5.2.1.RELEASE.jar is getting
> flagged for “high" security vulnerability CVE-2020-5398.
>
> Analysis shows that Geode does not use Spring in a manner that would
> expose this vulnerability (none of our REST apis or pulse set a
> Content-Disposition header derived from user-supplied input).
>
> The risk of bringing GEODE-7970 is low.  This patch update from 5.2.1 to
> 5.2.5 brings bug fixes only.  This exact version was on develop from Apr 8
> - Apr 10 & passed all tests.
>
> This fix is critical to avoid false positives in automated vulnerability
> scans.
>
> -Owen

Reply via email to