Hello
> It may look like Jackson has not provided CVE fixes for these reports > on their 2.8.x versions. That version is what is in use for Camel > 2.20.x and 2.21.x and therefore its more tricky to do something about > it. Camel users can try to switch to use Jackson 2.9.5 with their > Camel 2.20.x or 2.21.x as its just a matter of selecting the JARs in > their classpath/application. > (Always) remember about swagger dependencies... Swagger quite loosely treats semantic versioning. Between 1.5.17 and 1.5.18 there was jackson upgrade from 2.8.x to 2.9.x Just my heads-up that this should be checked. regards Grzegorz Grzybek > And as Jackson is also used by Spring Boot then we are trying to align > with the supported version of Jackson that Spring Boot uses. And Camel > 2.20.x and 2.21.x is using Spring Boot 1.5.x. > > And Jackson has sometimes in-compatability issues so its not always an > easy upgrade. > > > > > On Mon, Apr 16, 2018 at 1:00 PM, David Atkins <davidatkin...@gmail.com> > wrote: > > Hello, > > > > I've recently ran a dependency check on the camel-jackson 2.21.0 and > > it appears that the version of jackson being used (2.8.10) has two > > High/Severe vulnerabilities. > > > > To fix this for camel-jackson we'll need to upgrade as follows: > > > > CVE-2017-17485 - Jackson 2.9.3 or greater > > CVE-2018-7489 - Jackson 2.9.5 or greater > > > > I can see that the parent pom on the mainline has been upgraded to > > 2.9.4 (as part of spring boot 2 migration), so that covers > > CVE-2017-17485 'for free' > > > > More information available here: > > > > https://nvd.nist.gov/vuln/detail/CVE-2017-17485 > > https://nvd.nist.gov/vuln/detail/CVE-2018-7489 > > > > Shall I raise a JIRA to address this (possible as two separate tickets > > to track both issues?) > > > > Thanks, > > > > David > > > > -- > Claus Ibsen > ----------------- > http://davsclaus.com @davsclaus > Camel in Action 2: https://www.manning.com/ibsen2 >