Open
Conversation
a98df02 to
9ecdf2c
Compare
4b1ff84 to
a2244b0
Compare
a2244b0 to
b5f9c5f
Compare
b5f9c5f to
afd831f
Compare
afd831f to
a2b32e0
Compare
a5bfcf8 to
5f0b378
Compare
5f0b378 to
40b8e14
Compare
40b8e14 to
0c9f678
Compare
0c9f678 to
1f35bdb
Compare
1f35bdb to
bd56d59
Compare
bd56d59 to
4df91d2
Compare
4df91d2 to
2050dd1
Compare
7656fbf to
fba6152
Compare
0c97198 to
cad27d5
Compare
42e2729 to
a3617f0
Compare
9276797 to
262e4c9
Compare
262e4c9 to
58009b5
Compare
89f5575 to
7509fff
Compare
7509fff to
b2b8b83
Compare
b2b8b83 to
6b3c70d
Compare
6b3c70d to
8999423
Compare
8999423 to
86df21c
Compare
86df21c to
86d6656
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
3.3.1→3.5.116.1.6→6.2.166.1.6→6.1.213.0.2→3.1.12.14.0→2.21.12.14.0→2.21.17.1.1→7.41.2.11→1.2.131.2.11→1.5.251.18.36→1.18.421.15→1.21.03.12.0→3.18.0GitHub Vulnerability Alerts
CVE-2024-38809
Description
Applications that parse ETags from
If-MatchorIf-None-Matchrequest headers are vulnerable to DoS attack.Affected Spring Products and Versions
org.springframework:spring-web in versions
6.1.0 through 6.1.11
6.0.0 through 6.0.22
5.3.0 through 5.3.37
Older, unsupported versions are also affected
Mitigation
Users of affected versions should upgrade to the corresponding fixed version.
6.1.x -> 6.1.12
6.0.x -> 6.0.23
5.3.x -> 5.3.38
No other mitigation steps are necessary.
Users of older, unsupported versions could enforce a size limit on
If-MatchandIf-None-Matchheaders, e.g. through a Filter.CVE-2024-38820
The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.
CVE-2025-41234
Description
In Spring Framework, versions 6.0.x as of 6.0.5, versions 6.1.x and 6.2.x, an application is vulnerable to a reflected file download (RFD) attack when it sets a “Content-Disposition” header with a non-ASCII charset, where the filename attribute is derived from user-supplied input.
Specifically, an application is vulnerable when all the following are true:
org.springframework.http.ContentDisposition.ContentDisposition.Builder#filename(String, Charset).An application is not vulnerable if any of the following is true:
org.springframework.http.ContentDisposition.ContentDisposition.Builder#filename(String), orContentDisposition.Builder#filename(String, ASCII)Affected Spring Products and VersionsSpring Framework
Mitigation
Users of affected versions should upgrade to the corresponding fixed version.
No further mitigation steps are necessary.
CVE-2023-6378
A serialization vulnerability in logback receiver component part of logback allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
This is only exploitable if logback receiver component is deployed. See https://logback.qos.ch/manual/receivers.html
CVE-2024-12798
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.
Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension.
A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
CVE-2024-12801
Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to forge requests by compromising logback configuration files in XML.
The attacks involves the modification of DOCTYPE declaration in XML configuration files.
CVE-2025-11226
QOS.CH logback-core versions up to 1.5.18 contain an ACE vulnerability in conditional configuration file processing in Java applications. This vulnerability allows an attacker to execute arbitrary code by compromising an existing logback configuration file or by injecting a malicious environment variable before program execution.
A successful attack requires the Janino library and Spring Framework to be present on the user's class path. Additionally, the attacker must have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privileges.
CVE-2026-1225
ACE vulnerability in configuration file processing by QOS.CH logback-core up to and including version 1.5.24 in Java applications, allows an attacker to instantiate classes already present on the class path by compromising an existing logback configuration file.
The instantiation of a potentially malicious Java class requires that said class is present on the user's class-path. In addition, the attacker must have write access to a configuration file. However, after successful instantiation, the instance is very likely to be discarded with no further ado.
CVE-2025-48924
Uncontrolled Recursion vulnerability in Apache Commons Lang.
This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0.
The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop.
Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Release Notes
spring-projects/spring-boot (org.springframework.boot:spring-boot-starter-validation)
v3.5.11Compare Source
🐞 Bug Fixes
📔 Documentation
@Value' still apply for environment variables #49054🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@dsyer, @linkian209, @nosan, @quaff, @scordio, and @srt
v3.5.10Compare Source
🐞 Bug Fixes
📔 Documentation
🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@GaoSSR, @izeye, and @ngocnhan-tran1996
v3.5.9Compare Source
🐞 Bug Fixes
@DirtiesContextand Citrus Spring Boot Simulator #48450📔 Documentation
@EnableBatchProcessingturns off all batch auto-configuration, including schema initialization #48265@AutoConfiguration#48227🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@banseok1216, @berry120, @dmitrysulman, @geopark021, @noojung, @scottfrederick, @vpavic, and @youngledo
v3.5.8Compare Source
🐞 Bug Fixes
@ConditionalOnSingleCandidatewith multiple manually registered singletons #48123@PreDestroymethods #48061📔 Documentation
🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@K-jun98, @TerryTaoYY, @hojooo, @linw-bai, @mipo256, @namest504, @ngocnhan-tran1996, @nosan, @scottfrederick, @siva-sai-udaygiri, @tschut, and @vpavic
v3.5.7Compare Source
⭐ New Features
🐞 Bug Fixes
📔 Documentation
@Beanannotation #47330🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@DKARAGODIN, @JinhyeokFang, @Lublanski, @Pankraz76, @fhiyo, @ngocnhan-tran1996, @nosan, @scottfrederick, and @xyraclius
v3.5.6Compare Source
🐞 Bug Fixes
📔 Documentation
🔨 Dependency Upgrades
❤️ Contributors
Thank you to all the contributors who worked on this release:
@Chanwon-Seo, @doljae, @izeye, and @quaff
v3.5.5Compare Source
🐞 Bug Fixes
@Name#46666@Namewith a constructor-bound property #46663@FilterRegistrationannotation #46605📔 Documentation
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.
This PR was generated by Mend Renovate. View the repository job log.