No committer has volunteered to manage releases on those older code branches. For your Java11-based product, you will need to build jars from the head of the 10.15 branch.

Instructions for downloading the head of the 10.15 branch can be found here: https://cwiki.apache.org/confluence/display/DERBY/ForNewDevelopers#ForNewDevelopers-CheckOut,BuildtheCodeandruntheTests The actual subversion command you need is

  svn co https://svn.apache.org/repos/asf/db/derby/code/ <https://svn.apache.org/repos/asf/db/derby/code/trunk>branches/10.15 derby

Instructions for building the head of the 10.15 branch can be found here: https://svn.apache.org/repos/asf/db/derby/code/branches/10.15/BUILDING.html

The CVE in question affects applications which use Derby's LDAP-based authentication mechanism. We don't get a lot of feedback about which authentication mechanisms are used in production. Does your application rely on Derby's LDAP-based authentication? If not, you could insulate your application from this CVE by placing your application under Derby's NATIVE authentication mechanism. See the topic called "Configuring NATIVE authentication" in the 10.15 security guide: https://db.apache.org/derby/docs/10.15/security/index.html

Hope this helps,
-Rick

On 12/9/24 8:06 AM, Frank Domina wrote:
Hello. I'm new to the group, so I hope this is the appropriate place to ask 
this.

Over a year ago, v10.17.1.0 was released, which contained a fix for an LDAP injection 
vulnerability (CVE-2022-46337 / BDSA-2022-4287). The Jira ticket is 
DERBY-7147<https://issues.apache.org/jira/browse/DERBY-7147>, which indicates 
that the fix also went in v10.14.3, v10.15.2.1, and v10.16.1.2. A cursory look at the 
code seems to confirm this. However, it has been well over a year since the fix was 
made, yet the only version that was ever released was v10.17.1.0.

This effectively has stranded anyone not running Java 21 or later, and there is 
a lot of software out there that is still using Java 17, 11 and even 8, with 
those JREs being supported for another 6-8 years. In fact, Java 11's support 
extends a year beyond 21's, 
perhttps://www.azul.com/products/azul-support-roadmap/. We have a product that, 
for multiple externally-controlled reasons, is stuck at Java 11 for the 
foreseeable future, and an older one that EOL's 12/2025 that is still using 
Java 8. I can't imagine we're alone in either of those boats.

What does it take to get Derby v10.14.3, v10.15.2.1, and v10.16.1.2 (containing 
that CVE fix) publicly released?

Best regards,
Frank Domina


Reply via email to