-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update jackson-databind to 2.13.4.1 at least in order to fix vulnerabilities CVE-2022-42004 and CVE-2022-42003 #276
Comments
Thanks for the heads-up. I'll release a new version this week. |
Thanks a lot, @eiiches |
@eiiches |
Yes, it should work fine. It's just we don't expect users to run jackson-jq-cli on production servers or in any critical part of production services. It is provided only to help developers write, test and debug their jq scripts on their machines. And yes, the command line options may change without any deprecation phase or prior notice. Hope this clarifies things for you :) |
I think it just takes some time for a new release to become visible there. It's already available on the Central, so you should be able to download the release directly from this link or using the following Maven dependency tag: <dependency>
<groupId>net.thisptr</groupId>
<artifactId>jackson-jq</artifactId>
<version>1.0.0-preview.20230409</version>
</dependency> |
Hello
The actual jackson-databind version is affected by CVE-2022-42004 and CVE-2022-42003
Please apply an upgrade to at least 2.13.4.1 in order to fix the vulnerabilities
The text was updated successfully, but these errors were encountered: