-
Notifications
You must be signed in to change notification settings - Fork 212
Address Joda-Time CVE-2024-23080. #336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Signed-off-by: Ben Smith <benjsmi@us.ibm.com>
|
@benjsmi |
@benjsmi |
I don't completely understand this change. CVE-2024-23080 is currently listed as Disputed for a vulnerability in joda-time v2.12.5. Before this change, the version of joda-time resolved by fabric-chaincode-shim was v2.10.2. After this change, the version of joda-time resolved is still v2.10.2. There is no vulnerability showing up in the scheduled vulnerability scan. What does this change fix? |
Yeah we may want to reopen this issue (#337). I attempted to resolve this problem with my PR but it doesn't seem to have done the trick as @bestbeforetoday indicates. Specifically, I was under the impression that moving to latest It looks like the whole Everit JSON Schema project has moved from https://mvnrepository.com/artifact/com.github.erosb/everit-json-schema/1.14.4 over to https://mvnrepository.com/artifact/com.github.java-json-tools/json-schema-validator? Is it possible to use this in place of the other? The trace is: everit-json-schema -> handy-uri-templates -> joda-time... So, I think maybe we are more stuck than I thought, unless we are able to override transitive dependencies in Maven (I've never known how to do that). From where I sit, we'd need Regarding the disputed nature of CVE-2024-23080... a few things: 1) the tools that I am required to use don't show it as disputed, even though I agree with you that it is. 2) it's easier to just move to the latest version than to just explain over and over again that it's a disputed CVE. 3) I've seen many CVEs be disputed until they just aren't, so it's probably a temporary thing. |
I can totally relate to just updating the dependency as being the easiest path. I've been in the same situation many times. Maven prefers the closest dependency in the dependency tree. This means a top-level POM file dependency on a component at a specific version will take precedence over the versions of any transitive dependencies on the same component. This is generally not a good idea since changes between versions can break the other components that depend on it at a specific version. If possible, it safer to update just the direct dependencies to versions where the transitive dependency is at a good version. At a quick glance, it doesn't look like everit-json-schema leaks out into the public API anywhere so I'd be quite happy for it to replaced by something newer/better. |
As per #337