Paul,
  since you are already aware of it and expect this to be updated in the next 
release, that satisfies my needs.

The matter of the CVE being applicable has been muddied by the fact I am not 
the ultimate consumer and those users are outside of my visibility. I am also 
subject to an internal policy to address pretty much anything that gets flagged 
when possible. The choice to use groovy-binary and include a full "GROOVY_HOME" 
as a monolithic blob was made a long time ago and has become just another one 
of those things I am forced to live with as my project is maintained.

Thank you very much for your reply,
Jeff


From: Paul King <pa...@asert.com.au>
Date: Tuesday, April 25, 2023 at 6:11 AM
To: dev@groovy.apache.org <dev@groovy.apache.org>, Jeffrey Adamson 
<jeffrey.adam...@hcl.com>
Subject: Re: Bump Jackson dependency to 2.15.0
[CAUTION: This Email is from outside the Organization. Unless you trust the 
sender, Don’t click links or open attachments as it may be a Phishing email, 
which can steal your Information and compromise your Computer.]

Hi Jeffrey,

The dependencyUpdate task in the build is already flagging that dependency as 
needing updating. We are prompted by dependabot for some of our dependencies 
and others we check before doing a new release. So, there is no action needed 
but feel free to create a Jira task if you want better visibility (details on 
https://groovy.apache.org/).

If you use a build system rather than groovy-binary, you can manually select 
updated Jackson or SnakeYAML dependencies with the current releases.

If you are using groovy-binary but aren't parsing untrusted yaml source files, 
you can ignore the CVE flag as a false positive since it doesn't affect you.

If you are using groovy-binary and are parsing untrusted yaml source files 
directly yourself, and you have turned on SnakeYAML security features yourself, 
you can ignore the CVE flag as a false positive since it doesn't affect you.

Cheers, Paul.



On Tue, Apr 25, 2023 at 7:47 AM Jeffrey Adamson via dev 
<dev@groovy.apache.org<mailto:dev@groovy.apache.org>> wrote:
Similar to several historical issues, I would like to bring attention to the 
recent release of Jackson 2.15.0. It addresses a snakyaml update for 
CVE-2022-1471.

In particular, I am currently using groovy-binary 3.0.17 and have a static 
analysis tool which is flagging that artifact with that CVE. Is there a 
preferred method for requesting this dependency be updated from 2.14.2 to 
2.15.0?
::DISCLAIMER::
________________________________
The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only. E-mail transmission is not guaranteed to be 
secure or error-free as information could be intercepted, corrupted, lost, 
destroyed, arrive late or incomplete, or may contain viruses in transmission. 
The e mail and its contents (with or without referred errors) shall therefore 
not attach any liability on the originator or HCL or its affiliates. Views or 
opinions, if any, presented in this email are solely those of the author and 
may not necessarily reflect the views or opinions of HCL or its affiliates. Any 
form of reproduction, dissemination, copying, disclosure, modification, 
distribution and / or publication of this message without the prior written 
consent of authorized representative of HCL is strictly prohibited. If you have 
received this email in error please delete it and notify the sender 
immediately. Before opening any email and/or attachments, please check them for 
viruses and other defects.
________________________________

Reply via email to