-
Notifications
You must be signed in to change notification settings - Fork 951
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-46131 Discussion #13302
Comments
Snakeyaml is also being updated as part of the Grails 5.3.5 release and this in turn causes a substantial amount of plugin versions to mismatch / need upgrading. Specifically, snakeyaml 2.0 is incompatible with certain older versions of jackson. Was the snakeyaml change needed for the binding fix? It looks like #13239 was the pull request that applied the fix to grails 5.3.x. Can this be confirmed as the actual fix? |
That pull request was part of the 5.3.4 release, which did include the patch for CVE-2023-46131 but also created the plugin issue. Release 5.3.5 should resolve the plugin issue. |
After the upgrade from
Problem goes away after downgrade, not sure about any side effects but so far good :
|
Investigating… |
Hi, we are also running a legacy app that is on Grails 3.3.15. After the 3.3.17 upgrade we are seeing similar compatibility issues as mentioned above.
is there any update on this issue at this stage? |
Hi, same problem after upgrading from to 3.3.9 to to 3.3.17 |
My apologies for the problems. We're working on it. I should have an answer for you all soon. |
For those who have had issues with 3.3.17 or 5.3.5, please give 3.3.18 or 5.3.6 a try. While fixing the CVE, an unrelated update was made that caused a major version bump to SnakeYAML. These latest patch releases reverted that SnakeYAML change. |
Version 4.1.x was also patched to 4.1.4 to revert the SnakeYAML change, and the blog post was updated with the fixed releases. |
Hi,Execution of grails command is failing. Isn't the projectVersion variable 4.1.4-SNAPSHOT in the first line of gradle.properties incorrect? Isn't it necessary to modify projectVersion=4.1.4? |
I'm looking into this. |
@motohi |
@mattmoss You can see the runtime output in related issues. |
I think this is because there is no 4.1.4 release of Grails Gradle Plugin. Before Grails 5 the versions of Grails and the Grails Gradle Plugin where connected: So the solution seems to be to make a 4.1.4 release of Grails Gradle Plugin. |
@puneetbehl Can you confirm/release v4.1.4 of the Gradle plugin? |
I'm trying to upgrade a Grails App from 5.3.67 to 6.2.0, or 6.1.2 and in both cases I can see (via the Gradle project-report plugin) that snakeyaml 2.x is pulled in and is overriding the default version provided by Spring Boot. That is - e.g.:
I note that Grails 5.3.6 does not do this - presumably as the result of the work done above? Anyway the Boot guys seem to be sayin that snakeyaml 2.x cannot be used with Boot 2.7.x so will Grails 6.x still work if I force the snakyaml version down to 1.3 in the build.gradle Cheers |
@boardbloke I believe snakeyaml was upgraded to eliminate certain CVEs (unrelated to this thread), but I don't believe grails-core (i.e. the module requiring snakeyaml 2.2) made any related changes. @puneetbehl Do you have any comments on this? |
Done that, and it appears to work. I gues the only further comment I have is that if Grails 6.x is targetting Spring Boot 2.7.x then it shouldn't be upgrading snakeyaml to 2.2. Every project will have to downgrade it again to get it to work. I.e. upgrading snakeyaml in Grails doesn't really "fix" anything. Cheers |
@boardbloke I don't have the info for you about reasons for the Grails 6.x change, and unfortunately, I am no longer with the Grails team in any capacity, so I personally cannot help here much further. Since this particular issues was for CVE-2023-46131, I would recommend opening a new issue to deal with that particular bit (i.e. snakeyaml and Spring Boot versions), and hopefully whoever is still on the Grails team can address that issue. |
A vulnerability in the Grails® framework has been identified and patched. For details, please see the blog post announcing the vulnerability and the published security advisory.
If you use a vulnerable version of the Grails® framework, upgrading to a patched version is highly recommended.
This thread has been opened to facilitate discussion about CVE-2023-46131. If you have any comments or questions, please add them below.
The text was updated successfully, but these errors were encountered: