Skip to content

Conversation

@shanjare2002
Copy link

I changed the Jackon version from 2.8.8 -> 2.8.9

@shanjare2002 shanjare2002 requested a review from a team November 19, 2024 17:51
@eddumelendez
Copy link
Member

Hi, how moving to patch version is going to fix security vulnerabilities? Can you elaborate?

@shanjare2002
Copy link
Author

A deserialization flaw was discovered in the jackson-databind, versions before 2.6.7.1, 2.7.9.1 and 2.8.9, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This is critical vulnerability, and was patched in jackson 2.8.9 version and up. Jackson is only used in the core
The only change was in the above mentioned modules as these are the only ones that jackson.

@shanjare2002
Copy link
Author

Can this merge request be checked it has been 3 months.

@eddumelendez
Copy link
Member

Is this affecting from the test perspective? The plan is to update dependencies in the next months. Thanks for raising the PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants