Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cantaloup 5.0.6 #641

Merged
merged 40 commits into from
Jan 24, 2024
Merged

Conversation

glenrobson
Copy link

@glenrobson glenrobson commented Jan 24, 2024

Todo:

@glenrobson
Copy link
Author

Created a basic CREDITS.md but should credit the other people who have contributed.

@glenrobson
Copy link
Author

glenrobson commented Jan 24, 2024

S3 tests:

"For the S3 tests, I use minio or s3proxy (https://github.com/gaul/s3proxy) running locally. The S3 tests work in CI using minio. My S3 keys in test.properties look like:

s3.service = minio
s3.endpoint = http://localhost:9000/
s3.region = us-east-2
s3.access_key_id = minioadmin
s3.secret_key = minioadmin
s3.bucket = cantaloupe-test"

Looks like the s3 tests are part of the CI anyway so no need to test this seperatly.

@glenrobson
Copy link
Author

Running: mvn verify -DskipTests=true

One or more dependencies were identified with known vulnerabilities in Cantaloupe:

caffeine-3.1.6.jar (pkg:maven/com.github.ben-manes.caffeine/caffeine@3.1.6, cpe:2.3:a:cache_project:cache:3.1.6:*:*:*:*:*:*:*) : CVE-2020-36448
protobuf-java-4.0.0-rc-2.jar (pkg:maven/com.google.protobuf/protobuf-java@4.0.0-rc-2, cpe:2.3:a:google:protobuf-java:4.0.0.2:*:*:*:*:*:*:*, cpe:2.3:a:protobuf:protobuf:4.0.0.2:*:*:*:*:*:*:*) : CVE-2021-22569, CVE-2022-3171, CVE-2022-3509
commons-logging-1.1.1.jar (pkg:maven/commons-logging/commons-logging@1.1.1, cpe:2.3:a:apache:commons_net:1.1.1:*:*:*:*:*:*:*) : CVE-2021-37533
commons-io-2.13.0.jar (pkg:maven/commons-io/commons-io@2.13.0, cpe:2.3:a:apache:commons_io:2.13.0:*:*:*:*:*:*:*, cpe:2.3:a:apache:commons_net:2.13.0:*:*:*:*:*:*:*) : CVE-2021-37533
netty-transport-4.1.96.Final.jar (pkg:maven/io.netty/netty-transport@4.1.96.Final, cpe:2.3:a:netty:netty:4.1.96:*:*:*:*:*:*:*) : CVE-2023-44487
commons-csv-1.10.0.jar (pkg:maven/org.apache.commons/commons-csv@1.10.0, cpe:2.3:a:apache:commons_net:1.10.0:*:*:*:*:*:*:*) : CVE-2021-37533
commons-codec-1.16.0.jar (pkg:maven/commons-codec/commons-codec@1.16.0, cpe:2.3:a:apache:commons_net:1.16.0:*:*:*:*:*:*:*) : CVE-2021-37533
commons-compress-1.24.0.jar (pkg:maven/org.apache.commons/commons-compress@1.24.0, cpe:2.3:a:apache:commons_compress:1.24.0:*:*:*:*:*:*:*, cpe:2.3:a:apache:commons_net:1.24.0:*:*:*:*:*:*:*) : CVE-2021-37533
commons-cli-1.5.0.jar (pkg:maven/commons-cli/commons-cli@1.5.0, cpe:2.3:a:apache:commons_net:1.5.0:*:*:*:*:*:*:*) : CVE-2021-37533
jsonld-java-0.13.4.jar (pkg:maven/com.github.jsonld-java/jsonld-java@0.13.4, cpe:2.3:a:json-java_project:json-java:0.13.4:*:*:*:*:*:*:*) : CVE-2022-45688, CVE-2023-5072
jakarta.json-2.0.1.jar (pkg:maven/org.glassfish/jakarta.json@2.0.1, cpe:2.3:a:json-java_project:json-java:2.0.1:*:*:*:*:*:*:*) : CVE-2022-45688, CVE-2023-5072
jackson-databind-2.15.2.jar (pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.15.2, cpe:2.3:a:fasterxml:jackson-databind:2.15.2:*:*:*:*:*:*:*) : CVE-2023-35116
snakeyaml-2.0.jar (pkg:maven/org.yaml/snakeyaml@2.0, cpe:2.3:a:snakeyaml_project:snakeyaml:2.0:*:*:*:*:*:*:*, cpe:2.3:a:yaml_project:yaml:2.0:*:*:*:*:*:*:*) : CVE-2021-4235, CVE-2022-3064
guava-19.0.jar (pkg:maven/com.google.guava/guava@19.0, cpe:2.3:a:google:guava:19.0:*:*:*:*:*:*:*) : CVE-2018-10237, CVE-2020-8908, CVE-2023-2976
plexus-interpolation-1.26.jar (pkg:maven/org.codehaus.plexus/plexus-interpolation@1.26, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:1.26:*:*:*:*:*:*:*) : CVE-2022-4244, CVE-2022-4245
plexus-archiver-4.7.1.jar (pkg:maven/org.codehaus.plexus/plexus-archiver@4.7.1, cpe:2.3:a:codehaus-plexus:plexus-archiver:4.7.1:*:*:*:*:*:*:*, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:4.7.1:*:*:*:*:*:*:*) : CVE-2023-37460
netty-transport-native-epoll-4.1.53.Final-linux-x86_64.jar (pkg:maven/io.netty/netty-transport-native-epoll@4.1.53.Final, cpe:2.3:a:netty:netty:4.1.53:*:*:*:*:*:*:*) : CVE-2021-21290, CVE-2021-21295, CVE-2021-21409, CVE-2021-37136, CVE-2021-37137, CVE-2021-43797, CVE-2022-24823, CVE-2022-41881, CVE-2023-34462, CVE-2023-44487
jquery.min.js (pkg:javascript/jquery@1.11.1) : CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023, jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates
bootstrap.min.js (pkg:javascript/bootstrap@3.3.5) : Bootstrap before 4.0.0 is end-of-life and no longer maintained., CVE-2016-10735, CVE-2018-14041, CVE-2018-14042, CVE-2018-20676, CVE-2018-20677, CVE-2019-8331
jruby-stdlib-9.4.3.0.jar: bcprov-jdk18on-1.71.jar (cpe:2.3:a:bouncycastle:bouncy_castle_for_java:1.71.0:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle:1.71.0:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.71.0:*:*:*:*:*:*:*) : CVE-2023-33202
velocity-engine-core-2.3.jar/META-INF/maven/commons-io/commons-io/pom.xml (pkg:maven/commons-io/commons-io@2.8.0, cpe:2.3:a:apache:commons_io:2.8.0:*:*:*:*:*:*:*, cpe:2.3:a:apache:commons_net:2.8.0:*:*:*:*:*:*:*) : CVE-2021-37533

@glenrobson
Copy link
Author

Updating the dependency-check-maven plugin which runs the verify code to latest (5.2.4 -> 9.0.9) results in the following issues:

bootstrap.min.js (pkg:javascript/bootstrap@3.3.5) : CVE-2016-10735, CVE-2018-14041, CVE-2018-14042, CVE-2018-20676, CVE-2018-20677, CVE-2019-8331, Bootstrap before 4.0.0 is end-of-life and no longer maintained.
guava-19.0.jar (pkg:maven/com.google.guava/guava@19.0, cpe:2.3:a:google:guava:19.0:*:*:*:*:*:*:*) : CVE-2023-2976, CVE-2018-10237, CVE-2020-8908
jackson-databind-2.15.2.jar (pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.15.2, cpe:2.3:a:fasterxml:jackson-databind:2.15.2:*:*:*:*:*:*:*, cpe:2.3:a:fasterxml:jackson-modules-java8:2.15.2:*:*:*:*:*:*:*) : CVE-2023-35116
jquery.min.js (pkg:javascript/jquery@1.11.1) : CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023, jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates
jruby-stdlib-9.4.3.0.jar: bcprov-jdk18on-1.71.jar (cpe:2.3:a:bouncycastle:bouncy-castle-crypto-package:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:bouncy_castle_crypto_package:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:bouncy_castle_for_java:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:the_bouncy_castle_crypto_package_for_java:1.71:*:*:*:*:*:*:*) : CVE-2023-33202
netty-transport-4.1.96.Final.jar (pkg:maven/io.netty/netty-transport@4.1.96.Final, cpe:2.3:a:netty:netty:4.1.96:*:*:*:*:*:*:*) : CVE-2023-44487
netty-transport-native-epoll-4.1.53.Final-linux-x86_64.jar (pkg:maven/io.netty/netty-transport-native-epoll@4.1.53.Final, cpe:2.3:a:netty:netty:4.1.53:*:*:*:*:*:*:*) : CVE-2021-37136, CVE-2021-37137, CVE-2022-41881, CVE-2023-44487, CVE-2021-43797, CVE-2023-34462, CVE-2021-21295, CVE-2021-21409, CVE-2021-21290, CVE-2022-24823
plexus-archiver-4.7.1.jar (pkg:maven/org.codehaus.plexus/plexus-archiver@4.7.1, cpe:2.3:a:codehaus-plexus:plexus-archiver:4.7.1:*:*:*:*:*:*:*, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:4.7.1:*:*:*:*:*:*:*) : CVE-2023-37460
plexus-interpolation-1.26.jar (pkg:maven/org.codehaus.plexus/plexus-interpolation@1.26, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:1.26:*:*:*:*:*:*:*) : CVE-2022-4244, CVE-2022-4245
protobuf-java-4.0.0-rc-2.jar (pkg:maven/com.google.protobuf/protobuf-java@4.0.0-rc-2, cpe:2.3:a:google:protobuf-java:4.0.0:rc-2:*:*:*:*:*:*, cpe:2.3:a:protobuf:protobuf:4.0.0:rc-2:*:*:*:*:*:*) : CVE-2022-3171, CVE-2022-3509, CVE-2021-22569

Resolutions:

Down to:

bootstrap.min.js (pkg:javascript/bootstrap@3.3.5) : CVE-2016-10735, CVE-2018-14041, CVE-2018-14042, CVE-2018-20676, CVE-2018-20677, CVE-2019-8331, Bootstrap before 4.0.0 is end-of-life and no longer maintained.
guava-19.0.jar (pkg:maven/com.google.guava/guava@19.0, cpe:2.3:a:google:guava:19.0:*:*:*:*:*:*:*) : CVE-2023-2976, CVE-2018-10237, CVE-2020-8908
jackson-databind-2.15.2.jar (pkg:maven/com.fasterxml.jackson.core/jackson-databind@2.15.2, cpe:2.3:a:fasterxml:jackson-databind:2.15.2:*:*:*:*:*:*:*, cpe:2.3:a:fasterxml:jackson-modules-java8:2.15.2:*:*:*:*:*:*:*) : CVE-2023-35116
jquery.min.js (pkg:javascript/jquery@1.11.1) : CVE-2015-9251, CVE-2019-11358, CVE-2020-11022, CVE-2020-11023, jQuery 1.x and 2.x are End-of-Life and no longer receiving security updates
jruby-stdlib-9.4.3.0.jar: bcprov-jdk18on-1.71.jar (cpe:2.3:a:bouncycastle:bouncy-castle-crypto-package:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:bouncy_castle_crypto_package:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:bouncy_castle_for_java:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:1.71:*:*:*:*:*:*:*, cpe:2.3:a:bouncycastle:the_bouncy_castle_crypto_package_for_java:1.71:*:*:*:*:*:*:*) : CVE-2023-33202
plexus-archiver-4.7.1.jar (pkg:maven/org.codehaus.plexus/plexus-archiver@4.7.1, cpe:2.3:a:codehaus-plexus:plexus-archiver:4.7.1:*:*:*:*:*:*:*, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:4.7.1:*:*:*:*:*:*:*) : CVE-2023-37460
plexus-interpolation-1.26.jar (pkg:maven/org.codehaus.plexus/plexus-interpolation@1.26, cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:1.26:*:*:*:*:*:*:*) : CVE-2022-4244, CVE-2022-4245
protobuf-java-4.0.0-rc-2.jar (pkg:maven/com.google.protobuf/protobuf-java@4.0.0-rc-2, cpe:2.3:a:google:protobuf-java:4.0.0:rc-2:*:*:*:*:*:*, cpe:2.3:a:protobuf:protobuf:4.0.0:rc-2:*:*:*:*:*:*) : CVE-2022-3171, CVE-2022-3509, CVE-2021-22569

@glenrobson
Copy link
Author

Running Spotbugs some small things but nothing I think that needs fixing.

@glenrobson
Copy link
Author

It looks like s3 version 2.21.4 is the first one to use netty-transport 4.1.100.Final which is the one with the fix.

@glenrobson
Copy link
Author

OK on to the release procedure.

@glenrobson glenrobson merged commit 38a136f into cantaloupe-project:release/5.0 Jan 24, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant