Hi all,

I think, that we are soon in a good state to do a 8.0.13.

However, there are some open points for which I want to get the
community's opinion.

# (1): CVE-2022-42003 (jackson-databind)

Were is one CVE related to jackson-databind:

https://nvd.nist.gov/vuln/detail/CVE-2022-42003 (before 2.14.0-rc1)

Users are only affected, if 'UNWRAP_SINGLE_VALUE_ARRAYS' is set to
enabled [1]. AFAIK, we do not enable that feature by default.

There is an ongoing discussion about 2.14.0 final on their list but it
seems that it will be late October / mid November until they will
release that artifact.

Question(s) to discuss is:

(a) Do we want to ship a release with a RC version? 
(b) Do we want to wait for 2.14.0.Final?
(c) Do we want to ship with 2.13.4 instead + adding a related section
to our release notes?

# (2): CVE-2022-41853 (hsqldb)

In addition, were is CVE-2022-41853, which affects HSQLDB < 2.7.1.
2.7.1 isn't available yet [2]. A workaround is to set a related sytsem
property to mitigate the behaviour.

Question(s) to discuss is:

(a) Do we want to wait for a 2.7.1 release before doing 8.0.13 (AFAIK,
no ETA yet)
(b) Add the workaround (via java args) to our startup scripts and go
for the release 
(c) Ship with 2.7.0 + adding a related section to our release notes?

Keep in mind: If we do not update to the "official" fix version (even
if we add related infos on our release note or mitigate via the
official workaround), automated security scanners will complain about
it and ops / security people will wonder about it.

Happy to receive feedback on these questions, so we can continue.

Gruß
Richard




[1] 
https://github.com/FasterXML/jackson/discussions/126#discussioncomment-3815395
[2] https://github.com/advisories/GHSA-77xx-rxvh-q682




Reply via email to