Skip to content

📦 Bump versions of multiple dependencies to address vulnerabilities#3

Open
softforgeinc wants to merge 3 commits intomainfrom
devtask/LINEAJE-TASK-841
Open

📦 Bump versions of multiple dependencies to address vulnerabilities#3
softforgeinc wants to merge 3 commits intomainfrom
devtask/LINEAJE-TASK-841

Conversation

@softforgeinc
Copy link

Lineaje has automatically created this pull request to resolve the following CVEs:

Component CVE ID Severity Description
org.apache.santuario:xmlsec:2.2.1 CVE-2021-40690 High All versions of Apache Santuario - XML Security for Java
prior to 2.2.3 and 2.1.7 are vulnerable to an issue where the
"secureValidation" property is not passed correctly when
creating a KeyInfo from a KeyInfoReference element. This
allows an attacker to abuse an XPath Transform to extract any
local .xml files in a RetrievalMethod element.
org.apache.santuario:xmlsec:2.2.1 CVE-2023-44483 Medium All versions of Apache Santuario - XML Security for Java
prior to 2.2.6, 2.3.4, and 3.0.3, when using the JSR 105 API,
are vulnerable to an issue where a private key may be
disclosed in log files when generating an XML Signature and
logging with debug level is enabled. Users are recommended to
upgrade to version 2.2.6, 2.3.4, or 3.0.3, which fixes this
issue.
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2022-42004 High Uncontrolled Resource Consumption in FasterXML
jackson-databind
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2022-42003 High Uncontrolled Resource Consumption in Jackson-databind
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2021-46877 High jackson-databind possible Denial of Service if using JDK
serialization to serialize JsonNode
com.fasterxml.jackson.core:jackson-databind:2.12.3 CVE-2020-36518 High Deeply nested json in jackson-databind
xalan:xalan:2.7.2 CVE-2022-34169 High The Apache Xalan Java XSLT library is vulnerable to an
integer truncation issue when processing malicious XSLT
stylesheets. This can be used to corrupt Java class files
generated by the internal XSLTC compiler and execute
arbitrary Java bytecode. A fix for this issue was published
in September 2022 as part of an anticipated 2.7.3 release.

You can merge this PR once the tests pass and the changes are reviewed.

Thank you for reviewing the update! 🚀

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant

Comments