You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@directory.apache.org by "Colm O hEigeartaigh (Jira)" <ji...@apache.org> on 2022/03/22 15:35:00 UTC

[jira] [Commented] (DIRKRB-757) CVE-2020-15250 vulnerability from the junit dependency in Kerby ASN1

    [ https://issues.apache.org/jira/browse/DIRKRB-757?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17510694#comment-17510694 ] 

Colm O hEigeartaigh commented on DIRKRB-757:
--------------------------------------------

Isn't it just a test dependency?

 
{code:java}
[INFO] org.apache.kerby:kerby-asn1:jar:2.0.2-SNAPSHOT
[INFO] +- junit:junit:jar:4.13.2:test {code}

> CVE-2020-15250 vulnerability from the junit dependency in Kerby ASN1
> --------------------------------------------------------------------
>
>                 Key: DIRKRB-757
>                 URL: https://issues.apache.org/jira/browse/DIRKRB-757
>             Project: Directory Kerberos
>          Issue Type: Bug
>          Components: has-project
>    Affects Versions: 2.0.1
>            Reporter: Thamindu Jayawickrama
>            Priority: Major
>   Original Estimate: 24h
>  Remaining Estimate: 24h
>
> *Kerby asn1 2.0.1* uses the *junit 4.13* version which has a direct vulnerability of CVE-2020-15250.
> [https://mvnrepository.com/artifact/org.apache.kerby/kerby-asn1/2.0.1]
> The project has been already updated with the [junit version 4.13.2|https://mvnrepository.com/artifact/junit/junit/4.13.2] which doesn't have any detected vulnerabilities.
> [https://github.com/apache/directory-kerby/blob/trunk/pom.xml#L56]
>  
> Can we expect a release with the updated junit version?



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@directory.apache.org
For additional commands, e-mail: dev-help@directory.apache.org