Conversation
…uce vulnerabilities The following vulnerabilities are fixed with an upgrade: - https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
|
This upgrade of the Jackson suite from version 2.10.1 to 2.21.2 is a high-risk change. It spans multiple minor versions and introduces several significant changes, including a raised Java version requirement, new processing limits for security, and behavioral modifications that require developer action and verification. Key Breaking Changes:
Recommendation: Given the number of impactful changes, thorough testing is essential. Developers should:
|
✅ Snyk checks have passed. No issues have been found so far.
💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse. |
Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
samples/client/petstore/java/resttemplate-withXml/pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-COMFASTERXMLJACKSONCORE-15907551
2.10.1->2.21.2com.fasterxml.jackson.core:jackson-databind:
2.10.1->2.21.2com.fasterxml.jackson.dataformat:jackson-dataformat-xml:
2.10.1->2.21.2com.fasterxml.jackson.jaxrs:jackson-jaxrs-json-provider:
2.10.1->2.21.2No Path FoundNo Known ExploitBreaking Change Risk
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling