Skip to content

Conversation

@dack-su
Copy link
Contributor

@dack-su dack-su commented Oct 7, 2023

What happened?

There are 1 security vulnerabilities found in org.postgresql:postgresql 42.3.3

What did I do?

Upgrade org.postgresql:postgresql from 42.3.3 to 42.5.1 for vulnerability fix

What did you expect to happen?

Ideally, no insecure libs should be used.

How can we automate the detection of these types of issues?

By using the GitHub Actions configurations provided by murphysec, we can conduct automatic code security checks in our CI pipeline.

The specification of the pull request

PR Specification from OSCS

@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

1 similar comment
@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

@agapple agapple merged commit ba924b9 into alibaba:master Oct 9, 2023
@agapple
Copy link
Member

agapple commented Oct 9, 2023

tks

zoemak pushed a commit to zoemak/canal that referenced this pull request Jan 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants