I too work with an organization that is a bit concerned about using a library 
with a 5-year old security issue. If the issue is a lack of volunteers, what 
can we do to help, especially given that the fix is already done? Do you need 
testers? People to build from source? Something else?

-Will Herrmann

> As has been the case for a long time, Xerces-J 2.12.0 needs volunteers to 
> actually make this release happen.
> 
> Michael Glavassevich
> XML Technologies and WAS Development
> IBM Toronto Lab
> E-mail: mrgla...@ca.ibm.com
> E-mail: mrgla...@apache.org
> 
> Gary Gregory <garydgreg...@gmail.com> wrote on 12/22/2017 01:46:28 PM:
>  
> > Good question. Xerces has been rather... inactive :-(
> > 
> > Gary
> > 
> > On Fri, Dec 22, 2017 at 7:15 AM, Yves Geissbühler <
> > yves.geissbueh...@incentage.com> wrote:
> > Hi all,
> > my problem is that Xerces-J 2.11.0 pops up on the OWASP Dependency 
> > Check [1] having the vulnerability CVE-2012-0881.
> > 
> > After some investigation I found that CVE-2012-0881 has been indeed 
> > fixed and is scheduled to be released for Xerces-J 2.12.0 [2].
> > 
> > However, no specific release date is given [3].
> > 
> > Could you point me to a release schedule or do you know the release 
> date?
> > 
> > Using libraries which contain vulnerabilities is not an option for 
> > my organisation. So, I'm hoping for a Xerces-J 2.11.0 release 
> > happening soonish.
> > 
> > Best regards,
> > Yves
> > 
> > [1] https://www.owasp.org/index.php/OWASP_Dependency_Check
> > [2] https://issues.apache.org/jira/browse/XERCESJ-1685
> > [3] https://issues.apache.org/jira/projects/XERCESJ/versions/12336542

---------------------------------------------------------------------
To unsubscribe, e-mail: j-users-unsubscr...@xerces.apache.org
For additional commands, e-mail: j-users-h...@xerces.apache.org

Reply via email to