Hi,

In light of SLING-12492 at [1] and the related PR and discussion at [2] I
think it would be worthwhile to have a vote about our dependency update
policy for dependencies with known security vulnerabilities.

1. https://issues.apache.org/jira/browse/SLING-12492
2.
https://github.com/apache/sling-org-apache-sling-scripting-javascript/pull/3


*History / Background:*

The wiki at [3] captures what we said in the past and remains a good
guideline for dependencies with no security concerns.  Also, the last time
this topic came up there was a discussion at [4] that ended with an
inconclusive outcome so please review that thread as well.

3. https://cwiki.apache.org/confluence/display/SLING/Dependabot
4. https://www.mail-archive.com/dev@sling.apache.org/msg122053.html



*The Proposal:*
Security scanning tools are regularly flagging sling projects as
"vulnerable" due to direct dependencies on other libraries that have known
security vulnerabilities.  These security reports can result in obscuring
"real" security problems due to all the noise that we could clean up by
changing our approach to such things.

Basically, the proposal up for a vote is whether we should encourage
updating the versions of dependencies to be the oldest compatible version
that does not have known security vulnerabilities.  This should resolve the
concerns being identified by the security scanning tools and still ensure
that our bundles are deployed in the widest possible range of "secure"
environments.

Please vote to approve this proposal:

 [ ] +1 Approve the proposal
 [ ]  0 Don't care
 [ ] -1 Reject the proposal, because ...

This majority vote is open for at least 72 hours.

Regards,
Eric

Reply via email to