Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Critical CVE CVE-2017-7525 in zjsonpatch-0.3.0.jar #3489

Open
Black-Pi opened this issue Sep 23, 2021 · 7 comments · May be fixed by #4700
Open

Critical CVE CVE-2017-7525 in zjsonpatch-0.3.0.jar #3489

Black-Pi opened this issue Sep 23, 2021 · 7 comments · May be fixed by #4700
Labels
security Pull requests that address a security vulnerability status/never-stale
Milestone

Comments

@Black-Pi
Copy link

The kubernetes-client uses the zjsonpatch-0.3.0.jar library which has a critical vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2017-7525
Please upgrade to an newer version of zjsonpatch.

@manusa manusa added the security Pull requests that address a security vulnerability label Sep 23, 2021
@oscerd
Copy link
Member

oscerd commented Sep 23, 2021

We are using a library from the old day of fabric8. We need to switch to something else if we want to upgrade.

@manusa
Copy link
Member

manusa commented Sep 23, 2021

Yes, I discussed this with @rohanKanojia the other day. That library is based in a fork of another repo. We might just depend on the original library.

Also the CVE is related to Jackson. I don't think there's a transitive dependency and the Client's Jackson dependency should be the applicable one. But we definitely need to tackle this.

@oscerd
Copy link
Member

oscerd commented Sep 23, 2021

The latest version of https://github.com/flipkart-incubator/zjsonpatch is using jackson 2.10.3, which is not affected by the CVE

@stale
Copy link

stale bot commented Dec 22, 2021

This issue has been automatically marked as stale because it has not had any activity since 90 days. It will be closed if no further activity occurs within 7 days. Thank you for your contributions!

@stale stale bot added the status/stale label Dec 22, 2021
@stale stale bot closed this as completed Dec 29, 2021
@manusa manusa added this to the 6.0.0 milestone Jan 3, 2022
@manusa manusa reopened this Jan 3, 2022
@manusa manusa modified the milestones: 6.0.0, 6.x Aug 30, 2022
mattnelson added a commit to mattnelson/kubernetes-client that referenced this issue Dec 19, 2022
@shawkins
Copy link
Contributor

shawkins commented Dec 21, 2022

@mattnelson @manusa the cve listed above applies just to the project, not to its usage in the fabric8 client - which uses its own managed version of the jackson dependencies. An issue with directly depending on the original project is that it brings in a transitive dependency on commons collections. Part of the motivation for the fork seems to have been removing that (and at the time the guava) dependency - https://github.com/fabric8io/zjsonpatch/tree/master/src/main/java/io/fabric8/zjsonpatch/internal

Are we open to adding a dependency (optional or otherwise) on commons collections?

If not we should try to push the upstream project to accept changes that will isolate or remove that dependency.

@mattnelson
Copy link

Another issue with directly depending on the original project is that it brings in a transitive dependency on commons collections. Part of the motivation for the fork seems to have been removing that (and at the time the guava) dependency -

guava/commons-collections4 are removed in 0.4.0 via flipkart-incubator/zjsonpatch#60

@mattnelson
Copy link

guava/commons-collections4 are removed in 0.4.0 via flipkart-incubator/zjsonpatch#60

looks like common-collections4 worked its way back in https://github.com/flipkart-incubator/zjsonpatch/blame/master/pom.xml#L149

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Pull requests that address a security vulnerability status/never-stale
Projects
None yet
5 participants