-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bump snakeyaml to address CVE-2022-38751 #1346
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
I think we need 2.0, right? https://bitbucket.org/snakeyaml/snakeyaml/issues/561/cve-2022-1471-vulnerability-in#comment-64876314 |
As long as we don't use snakeyaml directly, apparently clj-yaml is immune to this CVE by default. I think we just need to check if we use clj-yaml safely. TK also uses it. clj-commons/clj-yaml#83 |
Actually, there are 2 vulns:
We might not need the latter due to clj-yaml, but I think 1.33 is a good version to fix the former. |
Bump snakeyaml version to fix a security issue.
See this conversation to confirm we are not vulnerable to CVE-2022-1471.
The only place that CTIA might parse yaml is during trapperkeeper's bootstrap. But we don't use yaml configs and we'd always trust our own configuration anyway.
§ Squashed Commits