Spring Framework 6.1.6, 6.0.19 and 5.3.34 Available Now Including Fixes for CVE-2024-22262

原文英文,约200词,阅读约需1分钟。发表于:

On behalf of the team and everyone who has contributed, I am pleased to announce that Spring Framework 6.1.6, 6.0.19 and 5.3.34 are available now: Spring Framework 6.1.6 ships with 41 fixes and documentation improvements. This version will be shipped with Spring Boot 3.2.5, to be released next week. Spring Framework 6.0.19 ships with 14 fixes and documentation improvements. This version will be shipped with Spring Boot 3.1.11, to be released next week. Spring Framework 5.3.34 ships with 10 fixes and documentation improvements. The releases address CVE-2024-22262 for "URL Parsing with Host Validation (3rd report)". Important CVEs on popular projects, like the original CVE-2024-22243, often get attention from the security community. We received many reports and helpful feedback about new attack variants over the last weeks. The security of Spring applications is our priority and we will keep addressing vulnerabilities in a transparent and timely fashion. We are actively working on a new approach that will completely revisit the implementation. Upgrading your project Commercial customers using Spring Boot 2.7 or 3.0 can make use of Spring Boot Hotfix releases 2.7.20.3 and 3.0.15.3. Releases are available now on the Spring commercial artifact repository and can be accessed with a Spring Enterprise Subscription. Commercial customers and OSS users of Spring Boot 3.1 and 3.2 should manually upgrade to Spring Framework 6.0.19 and 6.1.6 now, and to Spring Boot 3.1.11 and 3.2.5 next week when those become available. Project Page | GitHub | Issues | Documentation

Spring Framework 6.1.6, 6.0.19, and 5.3.34 are now available to fix a security vulnerability. Upgrades are recommended for Spring Boot users.

Spring Framework 6.1.6, 6.0.19 and 5.3.34 Available Now Including Fixes for CVE-2024-22262
相关推荐 去reddit讨论