File tree Expand file tree Collapse file tree 2 files changed +13
-13
lines changed
Expand file tree Collapse file tree 2 files changed +13
-13
lines changed Original file line number Diff line number Diff line change 11[versions ]
22protoc = " 3.24.1"
3- grpc = " 1.57.2 "
4- hypertrace-framework = " 0.1.62 "
5- hypertrace-grpcutils = " 0.12.6 "
3+ grpc = " 1.59.1 "
4+ hypertrace-framework = " 0.1.63 "
5+ hypertrace-grpcutils = " 0.12.7 "
66hypertrace-kafka = " 0.3.9"
77hypertrace-bom = " +"
88hypertrace-attributeservice = " 0.14.35"
@@ -27,7 +27,7 @@ grpc-protobuf = { module = "io.grpc:grpc-protobuf" }
2727grpc-api = { module = " io.grpc:grpc-api" }
2828grpc-netty = { module = " io.grpc:grpc-netty" }
2929grpc-context = { module = " io.grpc:grpc-context" }
30- jackson-bom = { module = " com.fasterxml.jackson:jackson-bom" , version = " 2.15.2 " }
30+ jackson-bom = { module = " com.fasterxml.jackson:jackson-bom" , version = " 2.16.0 " }
3131jackson-databind = { module = " com.fasterxml.jackson.core:jackson-databind" }
3232jackson-datatype-jsr310 = { module = " com.fasterxml.jackson.datatype:jackson-datatype-jsr310" }
3333jackson-datatype-jdk8 = { module = " com.fasterxml.jackson.datatype:jackson-datatype-jdk8" }
Original file line number Diff line number Diff line change 1010 <cpe >cpe:/a:service_project:service</cpe >
1111 <cpe >cpe:/a:processing:processing</cpe >
1212 </suppress >
13- <suppress until =" 2023-12-31Z" >
14- <notes ><![CDATA[
15- Doesn't appear to be a real vulnerability, jackson maintainers discuss at https://github.com/FasterXML/jackson-databind/issues/3973
16- Revisit when suppression expires
17- ]]> </notes >
18- <packageUrl regex =" true" >^pkg:maven/com\.fasterxml\.jackson\.core/jackson\-databind@.*$
19- </packageUrl >
20- <cve >CVE-2023-35116</cve >
21- </suppress >
2213 <suppress until =" 2023-12-31Z" >
2314 <notes ><![CDATA[
2415 This vulnerability is disputed, with the argument that SSL configuration is the responsibility of the client rather
4132 <
packageUrl regex =
" true" >^pkg:maven/org\.eclipse\.jetty/jetty\
[email protected] \..*$</
packageUrl >
4233 <vulnerabilityName >CVE-2023-36479</vulnerabilityName >
4334 </suppress >
35+ <suppress until =" 2023-12-31Z" >
36+ <notes ><![CDATA[
37+ This CVE (rapid RST) is already mitigated as our servers aren't directly exposed, but it's also
38+ addressed in 1.59.1, which the CVE doesn't reflect (not all grpc impls versions are exactly aligned).
39+ Ref: https://github.com/grpc/grpc-java/pull/10675
40+ ]]> </notes >
41+ <packageUrl regex =" true" >^pkg:maven/io\.grpc/grpc\-.*@.*$</packageUrl >
42+ <cve >CVE-2023-44487</cve >
43+ </suppress >
4444</suppressions >
You can’t perform that action at this time.
0 commit comments