diff --git a/.trivyignore b/.trivyignore index 1c22d31..bb627f3 100644 --- a/.trivyignore +++ b/.trivyignore @@ -1,55 +1,8 @@ -# CVE-2022-25857 -# The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of -# Service (DoS) due missing to nested depth limitation for collections. -# -# org.yaml/snakeyaml is an indirect dependency we get from spring boot. A -# spring boot maintainer stated that "Most Sping Boot applications only need -# SnakeYaml to parse their own application.yml configuration. I don't -# think we can consider this content as untrusted input." I take this to mean -# we're likely not vulnerable to this issue. It should be fixed in Spring Boot -# 2.7.4, which as of 9/15 is not yet released. Snyk will notify us when a fix -# is available. At that time, we should remove this entry from the .trivyignore. -CVE-2022-25857 - - -# CVE-2021-23840 -# Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow -# the output length argument in some cases where the input length is close to the -# maximum permissable length for an integer on the platform. In such cases the return -# value from the function call will be 1 (indicating success), but the output length -# value will be negative. This could cause applications to behave incorrectly or crash. -# OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions -# should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by -# this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public -# updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other -# users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). -# Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). -# -# We've determined that we are not impacted by this vulnerability because: -# - we do not directly make any calls to the affected methods -# -# Performed by @daneleblanc, approved by @andytinkham -CVE-2021-23840 - -# CVE-2021-23840 -# The OpenSSL public API function X509_issuer_and_serial_hash() attempts to create a -# unique hash value based on the issuer and serial number data contained within an X509 -# certificate. However it fails to correctly handle any errors that may occur while -# parsing the issuer field (which might occur if the issuer field is maliciously -# constructed). This may subsequently result in a NULL pointer deref and a crash -# leading to a potential denial of service attack. The function -# X509_issuer_and_serial_hash() is never directly called by OpenSSL itself so -# applications are only vulnerable if they use this function directly and they use -# it on certificates that may have been obtained from untrusted sources. OpenSSL -# versions 1.1.1i and below are affected by this issue. Users of these versions should -# upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this -# issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. -# Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should -# upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y -# (Affected 1.0.2-1.0.2x). -# -# We've determined that we are not impacted by this vulnerability because: -# - we do not directly make any calls to the affected methods -# -# Performed by @daneleblanc, approved by @andytinkham -CVE-2021-23841 +# The following 4 CVEs are in indirect dependencies. There is no easy workaround to avoid +# them and they are not exploitable in our application. Additionally this application is only +# used for demos so harm from DoS attacks is very limited. We will ignore them until they +# are fixed in the indirect dependencies. +CVE-2022-3510 +CVE-2022-3171 +CVE-2022-3509 +CVE-2022-1471 diff --git a/CHANGELOG.md b/CHANGELOG.md index 0c0f50e..0d7ccd3 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -5,8 +5,13 @@ The format is based on [Keep a Changelog](http://keepachangelog.com/en/1.0.0/) and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.html). ## [Unreleased] + +## [1.2.1] - 2023-04-24 + ### Security -- Updated Springboot to 3.0.2 and Dockerfile to openjdk:21 +- Updated Spring boot to 3.0.6 and Dockerfile to eclipse-temurin + [conjurdemos/pet-store-demo#60](https://github.com/conjurdemos/pet-store-demo/pull/60) +- Updated Spring boot to 3.0.2 and Dockerfile to openjdk:21 [conjurdemos/pet-store-demo#58](https://github.com/conjurdemos/pet-store-demo/pull/58) - Updated postgresql to 42.5.1 to resolve CVE-2022-41946 [conjurdemos/pet-store-demo#57](https://github.com/conjurdemos/pet-store-demo/pull/57) @@ -46,5 +51,6 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0. The first tagged version. -[Unreleased]: https://github.com/cyberark/secretless-broker/compare/v1.2.0...HEAD +[Unreleased]: https://github.com/cyberark/secretless-broker/compare/v1.2.1...HEAD +[1.2.1]: https://github.com/cyberark/secretless-broker/compare/v1.2.0...v1.2.1 [1.2.0]: https://github.com/cyberark/secretless-broker/compare/v1.1.0...v1.2.0 diff --git a/Dockerfile b/Dockerfile index 3254410..df130b4 100644 --- a/Dockerfile +++ b/Dockerfile @@ -35,12 +35,9 @@ RUN mvn package && cp target/petstore-*.jar app.jar # This base is used for the final image # It extracts the packaged application from the previous stage # and builds the final image -FROM openjdk:21-slim +FROM eclipse-temurin:20-jre-alpine LABEL org.opencontainers.image.authors="CyberArk" -# Install the fix for CVE-2022-1271 -RUN apt-get update && apt-get dist-upgrade -y - COPY --from=summon /usr/local/lib/summon /usr/local/lib/summon COPY --from=summon /usr/local/bin/summon /usr/local/bin/summon COPY --from=maven /app/app.jar /app.jar diff --git a/VERSION b/VERSION index 26aaba0..6085e94 100644 --- a/VERSION +++ b/VERSION @@ -1 +1 @@ -1.2.0 +1.2.1 diff --git a/pom.xml b/pom.xml index 3d4c05b..80cb95e 100644 --- a/pom.xml +++ b/pom.xml @@ -5,19 +5,19 @@ org.springframework petstore - 0.1.0 + 0.2.1 org.springframework.boot spring-boot-starter-parent - 3.0.2 + 3.0.6 org.springframework.boot spring-boot-starter-web - 3.0.2 + 3.0.6 org.postgresql @@ -41,7 +41,7 @@ org.springframework.boot spring-boot-starter-data-jpa - 3.0.2 + 3.0.6 javax.xml.bind @@ -51,7 +51,7 @@ org.springframework.boot spring-boot-starter-validation - 3.0.2 + 3.0.6