This is an automated email from the ASF dual-hosted git repository.

abhishek pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/druid.git


The following commit(s) were added to refs/heads/master by this push:
     new 7467d2c00d5 Upgrade Jackson and Google GSON to address CVEs (#15461)
7467d2c00d5 is described below

commit 7467d2c00d56793a03844252e43aaf5b631856b9
Author: Keerthana Srikanth <[email protected]>
AuthorDate: Thu Nov 30 15:31:26 2023 +0530

    Upgrade Jackson and Google GSON to address CVEs (#15461)
    
    Upgrade Jackson to version 2.12.7.1 to address CVE-2022-42003, 
CVE-2022-42004 which affects jackson-databind.
    Upgrade com.google.code.gson:gson from 2.2.4 to the latest version (2.10.1) 
since 2.2.4 is affected by CVE-2022-25647.
---
 licenses.yaml                           |  4 ++--
 owasp-dependency-check-suppressions.xml | 16 ----------------
 pom.xml                                 |  4 ++--
 3 files changed, 4 insertions(+), 20 deletions(-)

diff --git a/licenses.yaml b/licenses.yaml
index ea5c8ede0ee..6724c28add7 100644
--- a/licenses.yaml
+++ b/licenses.yaml
@@ -289,7 +289,7 @@ name: Jackson
 license_category: binary
 module: java-core
 license_name: Apache License version 2.0
-version: 2.12.7
+version: 2.12.7.1
 libraries:
   - com.fasterxml.jackson.core: jackson-databind
 notice: |
@@ -2500,7 +2500,7 @@ name: Gson
 license_category: binary
 module: hadoop-client
 license_name: Apache License version 2.0
-version: 2.2.4
+version: 2.10.1
 libraries:
   - com.google.code.gson: gson
 
diff --git a/owasp-dependency-check-suppressions.xml 
b/owasp-dependency-check-suppressions.xml
index ab0f57c05b0..b4be731ec05 100644
--- a/owasp-dependency-check-suppressions.xml
+++ b/owasp-dependency-check-suppressions.xml
@@ -71,22 +71,6 @@
     <cve>CVE-2022-45688</cve>
   </suppress>
 
-  <suppress>
-    <!--
-      the suppressions here aren't currently applicable, but can be resolved 
once we update the version
-      -->
-    <notes><![CDATA[
-   file name: jackson-databind-2.10.5.1.jar
-   ]]></notes>
-    <packageUrl 
regex="true">^pkg:maven/com\.fasterxml\.jackson\.core/jackson\-databind@.*$</packageUrl>
-    <!-- CVE-2022-42003 and CVE-2022-42004 are related to 
UNWRAP_SINGLE_VALUE_ARRAYS which we do not use
-    https://nvd.nist.gov/vuln/detail/CVE-2022-42003
-    https://nvd.nist.gov/vuln/detail/CVE-2022-42004
-     -->
-    <cve>CVE-2022-42003</cve>
-    <cve>CVE-2022-42004</cve>
-  </suppress>
-
   <suppress>
     <!-- Pulled in by io.kubernetes:client-java and kafka_2.13 but not fixed 
in either place yet -->
     <!-- jose4j before v0.9.3 allows attackers to set a low iteration count of 
1000 or less -->
diff --git a/pom.xml b/pom.xml
index 652011e3897..a62d44a4584 100644
--- a/pom.xml
+++ b/pom.xml
@@ -78,7 +78,7 @@
         <apache.curator.version>5.5.0</apache.curator.version>
         <apache.kafka.version>3.6.0</apache.kafka.version>
         <apache.ranger.version>2.4.0</apache.ranger.version>
-        <apache.ranger.gson.version>2.2.4</apache.ranger.gson.version>
+        <apache.ranger.gson.version>2.10.1</apache.ranger.gson.version>
         <scala.library.version>2.13.11</scala.library.version>
         <avatica.version>1.23.0</avatica.version>
         <avro.version>1.11.3</avro.version>
@@ -98,7 +98,7 @@
         <hamcrest.version>1.3</hamcrest.version>
         <jetty.version>9.4.53.v20231009</jetty.version>
         <jersey.version>1.19.4</jersey.version>
-        <jackson.version>2.12.7</jackson.version>
+        <jackson.version>2.12.7.20221012</jackson.version>
         <codehaus.jackson.version>1.9.13</codehaus.jackson.version>
         <log4j.version>2.18.0</log4j.version>
         <mysql.version>5.1.49</mysql.version>


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to