You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is there a timeline for the jHipster v8 release, and is it still planned to upgrade to Spring 6 as part of that release?
Motivation for or Use Case
Our team uses Prisma Cloud to scan all containers as part of our CI/CD pipeline and blocks deployments with High and Critical findings. We recently started receiving Prisma findings for CVE-2016-1000027, https://nvd.nist.gov/vuln/detail/CVE-2016-1000027. This is a finding in org.springframework.spring-web that has existed since 2016 but was previously not prioritized at the time of creation so it never showed up on any previous scans. In order to address the finding, it would cause a breaking change to the framework so Spring has no plans to address the issue in any of the maintained versions, but they have removed the code from the latest 6.x release. Since upgrading to Spring 6 is a major change, we would prefer to utilize the jhipster upgrade process instead of making manual changes.
I saw the previous PR for upgrading to Springboot 3 as part of v8 release was closed. #19782
Related issues or PR
[ x] Checking this box is mandatory (this is just to show you read everything)
The text was updated successfully, but these errors were encountered:
This issue is stale because it has been open for too long without any activity.
Due to the moving nature of jhipster generated application, bugs can become invalid.
If this issue still applies please comment otherwise it will be closed in 7 days
Overview of the feature request
Is there a timeline for the jHipster v8 release, and is it still planned to upgrade to Spring 6 as part of that release?
Motivation for or Use Case
Our team uses Prisma Cloud to scan all containers as part of our CI/CD pipeline and blocks deployments with High and Critical findings. We recently started receiving Prisma findings for CVE-2016-1000027, https://nvd.nist.gov/vuln/detail/CVE-2016-1000027. This is a finding in org.springframework.spring-web that has existed since 2016 but was previously not prioritized at the time of creation so it never showed up on any previous scans. In order to address the finding, it would cause a breaking change to the framework so Spring has no plans to address the issue in any of the maintained versions, but they have removed the code from the latest 6.x release. Since upgrading to Spring 6 is a major change, we would prefer to utilize the jhipster upgrade process instead of making manual changes.
I saw the previous PR for upgrading to Springboot 3 as part of v8 release was closed. #19782
Related issues or PR
The text was updated successfully, but these errors were encountered: