There appears to be consensus to bring this critical fix to support/1.12. I have done git cherry-pick -x ead319cc04e284838275669c2d502e1a8c5ad822 and updated GEODE-7970 to add 1.12.1 to the list of fixed versions.
Thanks -Owen > On Apr 10, 2020, at 1:24 PM, Dan Smith <dsm...@pivotal.io> wrote: > > +1 > > -Dan > > On Fri, Apr 10, 2020 at 12:37 PM Anilkumar Gingade <aging...@pivotal.io> > wrote: > >> +1 >> Based on: The risk is low. Avoids false positives in automated >> vulnerability scans. >> >> On Fri, Apr 10, 2020 at 12:33 PM Dick Cavender <dcaven...@pivotal.io> >> wrote: >> >>> +1 >>> >>> On Fri, Apr 10, 2020 at 11:16 AM Owen Nichols <onich...@pivotal.io> >> wrote: >>> >>>> Recently it’s been noticed that spring-core-5.2.1.RELEASE.jar is >> getting >>>> flagged for “high" security vulnerability CVE-2020-5398. >>>> >>>> Analysis shows that Geode does not use Spring in a manner that would >>>> expose this vulnerability (none of our REST apis or pulse set a >>>> Content-Disposition header derived from user-supplied input). >>>> >>>> The risk of bringing GEODE-7970 is low. This patch update from 5.2.1 >> to >>>> 5.2.5 brings bug fixes only. This exact version was on develop from >> Apr >>> 8 >>>> - Apr 10 & passed all tests. >>>> >>>> This fix is critical to avoid false positives in automated >> vulnerability >>>> scans. >>>> >>>> -Owen >>> >>