[Snyk] Security upgrade com.fasterxml.jackson.jaxrs:jackson-jaxrs-json-provider from 2.10.1 to 2.21.2#193
Conversation
…ilities The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
|
This upgrade from version 2.10.1 to 2.21.2 spans multiple minor versions and introduces several important changes, including new runtime requirements and behavioral modifications that require verification. Key Changes:
Recommendation: Given the change in Java version requirements and multiple behavioral changes, this is a medium-risk upgrade. It is critical to verify that your application runs on Java 8 or newer and is not dependent on JAX-RS 1.x. Thoroughly test serialization and deserialization logic to ensure compatibility with the new behaviors, especially around date formats and edge cases involving
|
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
samples/server/petstore/jaxrs-cxf-cdi/pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
2.10.1->2.21.2No Path FoundNo Known ExploitBreaking Change Risk
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling