It's under release vote. It should get done in few days.

On Wed, Jan 29, 2025 at 4:29 PM Mihir Chhaya <mihir.chh...@gmail.com> wrote:

> Thank you, Pedro for this.
>
> Question (for Apache Wicket Team): Could you please share the timeline for
> the 8.17 security fix release?
>
> Thank you once again,
> -Mihir
>
> On Mon, Jan 27, 2025 at 10:45 AM Pedro Santos <pedros...@gmail.com> wrote:
>
> > Hi, I applied the fix to the wicket-8.x branch and updated the tickets:
> >
> > https://issues.apache.org/jira/browse/WICKET-7024
> > https://issues.apache.org/jira/browse/WICKET-7137
> >
> > Should be available in the next 8.x version.
> >
> > Pedro Santos
> >
> >
> > On Fri, Jan 24, 2025 at 2:07 PM Mihir Chhaya <mihir.chh...@gmail.com>
> > wrote:
> >
> > > Same here - we have multiple projects developed with Wicket 7 and 8 and
> > it
> > > would be long before all the projects could be migrated to JDK 11+ and
> > > Apache Wicket 9.x.
> > > It would be truly helpful if the Wicket Team could help with a security
> > > fix.
> > >
> > > Thank you,
> > > -Mihir.
> > >
> > > On Fri, Jan 24, 2025 at 11:43 AM Jonathan Babie
> > <jba...@osc.ny.gov.invalid
> > > >
> > > wrote:
> > >
> > > > Hello,
> > > >
> > > > I was just looking to see if there are plans to address this in
> Wicket
> > > 8.x
> > > > since it's still in security fixes only status. Any information would
> > be
> > > > greatly appreciated and thank you again.
> > > >
> > > > Thank you,
> > > >
> > > > Jonathan Babie
> > > >
> > > > Information Technology Specialist IV
> > > >
> > > > Java Applications Unit | CIO | OSC
> > > >
> > > > Work: (838) 910-4274
> > > >
> > > > Personal: (518) 331-8758
> > > >
> > > > ________________________________
> > > > From: Pedro Santos <pe...@apache.org>
> > > > Sent: Thursday, January 23, 2025 10:21 AM
> > > > To: users@wicket.apache.org <users@wicket.apache.org>;
> > > > d...@wicket.apache.org <d...@wicket.apache.org>
> > > > Subject: CVE-2024-53299: Apache Wicket: An attacker can intentionally
> > > > trigger a memory leak
> > > >
> > > > Severity: critical
> > > >
> > > > Affected versions:
> > > >
> > > > - Apache Wicket 7.0.0 through 7.18.*
> > > > - Apache Wicket 8.0.0-M1 through 8.16.*
> > > > - Apache Wicket 9.0.0-M1 through 9.18.*
> > > > - Apache Wicket 10.0.0-M1 through 10.2.*
> > > >
> > > > Description:
> > > >
> > > > The request handling in the core in Apache Wicket 7.0.0 on any
> platform
> > > > allows an attacker to create a DOS via multiple requests to server
> > > > resources.
> > > > Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which
> > > fixes
> > > > this issue.
> > > >
> > > > Credit: (finder)
> > > >
> > > > References:
> > > >
> > > > https://lists.apache.org/thread/gyp2ht00c62827y0379lxh5dbx3hhho5
> > > > https://wicket.apache.org/
> > > > https://www.cve.org/CVERecord?id=CVE-2024-53299
> > > > Notice: This communication, including any attachments, is intended
> > solely
> > > > for the use of the individual or entity to which it is addressed.
> This
> > > > communication may contain information that is protected from
> disclosure
> > > > under State and/or Federal law. Please notify the sender immediately
> if
> > > you
> > > > have received this communication in error and delete this email from
> > your
> > > > system. If you are not the intended recipient, you are requested not
> to
> > > > disclose, copy, distribute or take any action in reliance on the
> > contents
> > > > of this information.
> > > >
> > >
> >
>


-- 
Andrea Del Bene.
Apache Wicket committer.

Reply via email to