Skip to content

Conversation

@jdelamar
Copy link

snyk-top-banner

Snyk has created this PR to fix 11 vulnerabilities in the maven dependencies of this project.

Snyk changed the following file(s):

  • pom.xml

Vulnerabilities that will be fixed with an upgrade:

Issue Score Upgrade
high severity Uncontrolled Recursion
SNYK-JAVA-ORGAPACHECOMMONS-10734078
  654   org.apache.commons:commons-lang3:
3.9 -> 3.18.0
No Known Exploit
high severity Stack-based Buffer Overflow
SNYK-JAVA-COMFASTERXMLJACKSONCORE-10500754
  649   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-7569538
  649   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
No Known Exploit
high severity XML External Entity (XXE) Injection
SNYK-JAVA-COMFASTERXMLJACKSONCORE-1048302
  624   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038424
  616   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
Proof of Concept
medium severity Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-3038426
  616   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
Proof of Concept
high severity Denial of Service (DoS)
SNYK-JAVA-COMFASTERXMLJACKSONCORE-2421244
  589   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
No Known Exploit
medium severity Information Exposure
SNYK-JAVA-COMFASTERXMLJACKSONCORE-10332631
  576   com.fasterxml.jackson.core:jackson-databind:
2.10.0 -> 2.15.0
Proof of Concept
medium severity Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
  509   com.google.guava:guava:
14.0.1 -> 32.0.0-android
No Known Exploit
low severity Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
  486   com.google.guava:guava:
14.0.1 -> 32.0.0-android
Proof of Concept
low severity Creation of Temporary File in Directory with Insecure Permissions
SNYK-JAVA-COMGOOGLEGUAVA-5710356
  379   com.google.guava:guava:
14.0.1 -> 32.0.0-android
No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Information Exposure
🦉 Denial of Service (DoS)
🦉 XML External Entity (XXE) Injection
🦉 More lessons are available in Snyk Learn

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "@codex address that feedback".

<commons-pool2.version>2.6.2</commons-pool2.version>
<datanucleus-core.version>4.1.17</datanucleus-core.version>
<guava.version>14.0.1</guava.version>
<guava.version>32.0.0-android</guava.version>

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Keep Guava version aligned between Maven and sbt builds

Updating ${guava.version} to 32.0.0-android here makes Maven builds compile against Guava 32, while the sbt build (see project/SparkBuild.scala:625) still defaults to 14.0.1 via DependencyOverrides, and Guava is marked provided in this POM. As a result the vulnerability fix is silently skipped for the default sbt packaging and Maven vs sbt artifacts are built against different Guava APIs, leaving behaviour and security remediation dependent on the build tool.

Useful? React with 👍 / 👎.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants