[ 
https://issues.apache.org/jira/browse/QPID-8501?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17273529#comment-17273529
 ] 

ASF subversion and git services commented on QPID-8501:
-------------------------------------------------------

Commit 8952114afe3220db60e48a1916df7673ad785160 in qpid-broker-j's branch 
refs/heads/8.0.x from Dedeepya T
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=8952114 ]

QPID-8501:[Broker-J]Upgrade bouncy castle versions


> Upgrade bouncycastle component versions
> ---------------------------------------
>
>                 Key: QPID-8501
>                 URL: https://issues.apache.org/jira/browse/QPID-8501
>             Project: Qpid
>          Issue Type: Improvement
>          Components: Broker-J
>    Affects Versions: qpid-java-broker-8.0.3
>            Reporter: Dedeepya
>            Priority: Major
>             Fix For: qpid-java-broker-8.0.4, qpid-java-broker-7.1.12
>
>
> The below components are reported as vulnerabilities and need to be upgraded
> ||Component Name||Component Version||
> |org.bouncycastle:bcprov-jdk15on|1.66|
> The above package is vulnerable to Comparison Using Wrong Factors. The 
> {{OpenBSDBCrypt.checkPassword}} utility method compared incorrect data when 
> checking the password, allowing incorrect passwords to indicate they were 
> matching with previously hashed ones that were different.
> [https://snyk.io/vuln/SNYK-JAVA-ORGBOUNCYCASTLE-1052448]
>  This is a test dependency, hence QPID broker is not vulnerable to the 
> reported issue. Though, we need to upgrade the bouncycastle version in order 
> to stop from being flagged by scanning tools



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org

Reply via email to