-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerability in dependency of jnr-unixsocket #226
Comments
Hi, thank you for reporting this. I work on the Vulnerability Management team here at Datadog and we are doing some internal investigation. I will reach out when I have more information to share |
@moegyver please see below for an update regarding this CVE While it would be nice to patch this issue and remove the CVE, it is largely out-of-scope within the use the jnr-unixsocket library makes of jnr-posix. We should be largely unaffected by the problem. Additionally, there's another major constraint which prevents us from just blindly bumping jnr-unixsocket to a more current version; the java-dogstatsd-client currently supports Java 1.7 and any update to the library would make us drop Java 1.7 support and increase our minimum JRE env to Java8, we would like to avoid this. For your and our peace of mind: both RHEL and Ubuntu have labeled the CVE impact as low despite NVD interpretation of the bug, see: https://ubuntu.com/security/CVE-2014-4043 Please let us know if you have further questions or concerns. |
I am wondering, is there any progress on this decision? We are using DD in our company services and due to company security policies we have to address this somehow as it keeps popping up on our security scans. So we were wondering, would it be possible to release another artifact that is for java8+? Popular crypto JCA/JCE library BouncyCastle adopted similar approach, releasing several JARs with minimal JDK version required (https://www.bouncycastle.org/latest_releases.html). It would help us greatly and I believe it would be also better for DD to get rid of this security finding. Thanks! |
Hi!
Our internal vulnerability scanning shows that jnr-unixsocket 0.36 has jnr-posix 3.0.61 as dependency which is vulnerable.
See https://security.snyk.io/vuln/SNYK-JAVA-COMGITHUBJNR-1570422, jnr-unixsocket has updated the dependency in later versions.
Updating to a never version of jnr-posix should solve this.
Please shout if you have questions.
The text was updated successfully, but these errors were encountered: