Fix CVE-2023-33201: Upgrade Bouncy Castle from 1.70 to 1.74 #3
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Dependabot alert OWASP-Benchmark#4 flagged CVE-2023-33201 (LDAP injection) in Bouncy Castle 1.70.
Changes
Artifact migration:
bcprov-jdk15on:1.70→bcprov-jdk15to18:1.74bcpkix-jdk15to18:1.74for PKI functionalityTransitive dependency exclusions: Added to
apacheds-coreandapacheds-protocol-ldapbcprov-jdk15onandbcpkix-jdk15onto prevent vulnerable versions from Apache Directory dependenciesVerified via
mvn dependency:treethat no 1.70 artifacts remain in the build.Warning
Firewall rules blocked me from connecting to one or more addresses (expand for details)
I tried to connect to the following addresses, but was blocked by firewall rules:
https://api.github.com//advisories/home/REDACTED/work/_temp/ghcca-node/node/bin/node /home/REDACTED/work/_temp/ghcca-node/node/bin/node --enable-source-maps /home/REDACTED/work/_temp/copilot-developer-action-main/dist/index.js(http block)If you need me to access, download, or install something from one of these locations, you can either:
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.