Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update copilot to 24.6.2 #7202

Merged
merged 1 commit into from
Jan 14, 2025
Merged

update copilot to 24.6.2 #7202

merged 1 commit into from
Jan 14, 2025

Conversation

vaadin-bot
Copy link
Contributor

No description provided.

@ZheSun88 ZheSun88 enabled auto-merge (squash) January 14, 2025 09:48
@ZheSun88 ZheSun88 merged commit ecbeab4 into 24.6 Jan 14, 2025
3 of 4 checks passed
@ZheSun88 ZheSun88 deleted the update-copilot-24.6.2-1736847978 branch January 14, 2025 10:15
Copy link

Dependencies Report

  • 🚫 Vulnerabilities:

    • Vulnerabilities in: pkg:maven/ch.qos.logback/logback-core@1.5.12 [CVE-2024-12801, CVE-2024-12798] (osv-scan,owasp)
      · cpe:2.3:a:ch.qos.logback:logback-core:1.5.12:::::::*
    • Vulnerabilities in: pkg:npm/libxmljs2@0.35.0 [CVE-2024-34394] (osv-scan)
      👌 This is coming from the tools, @cyclonedx/cyclonedx, we have used for sbom module, FP for us.
      ·
    • Vulnerabilities in: pkg:maven/com.squareup.okhttp3/logging-interceptor@3.12.12 [CVE-2023-0833] (owasp)
      · cpe:2.3:a:redhat:a-mq_streams::::::::
      · cpe:2.3:a:squareup:okhttp::::::::
  • 🟠 Known Vulnerabilities:

    • Vulnerabilities in: pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.15.3 [CVE-2023-35116] (owasp)
      👌 Not a valid CVE report based on the vendor analysis and research
      · cpe:2.3:a:fasterxml:jackson-databind::::::::
    • Vulnerabilities in: pkg:maven/me.friwi/jcef-api@jcef-99c2f7a%2Bcef-127.3.1%2Bg6cbb30e%2Bchromium-127.0.6533.100 [CVE-2024-21639, CVE-2024-21640] (owasp)
      👌 Wait for the update from the jcefmaven community. Meanwhile the swing-kit is supposed to be used with fixed websites and not to browse the internet, we have a check for that, so the only possible attacker would be the same person that created the swing application, aka our customer devs. so this vulnerability is not classified by us as critical issue
      · cpe:2.3:a:chromiumembedded:chromium_embedded_framework::::::::
  • 📔 No Core License Issues

  • 📔 No License Issues

  • 🟠 Changes in 24.6-SNAPSHOT since V24.6.1

    • 119 packages modified (22 external, 97 vaadin)
    • 983 packages same (854 external, 129 vaadin)

[Click for more Details]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants