You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Mike R (Jira)" <ji...@apache.org> on 2022/06/30 14:00:00 UTC

[jira] [Updated] (NIFI-10185) Update javax.ws.rs-api To Version 3.1.0

     [ https://issues.apache.org/jira/browse/NIFI-10185?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Mike R updated NIFI-10185:
--------------------------
    Description: Currently, the version of  javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] Updating to version 3.1 will remediate this vulnerable dependency The CVE can be found at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250  (was: Currently, the version of  javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] [CVE - CVE-2020-15250 (mitre.org)|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] [ Updating to version 3.1 will remediate this vulnerable dependency|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250])

> Update javax.ws.rs-api To Version 3.1.0
> ---------------------------------------
>
>                 Key: NIFI-10185
>                 URL: https://issues.apache.org/jira/browse/NIFI-10185
>             Project: Apache NiFi
>          Issue Type: Improvement
>            Reporter: Mike R
>            Priority: Major
>
> Currently, the version of  javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] Updating to version 3.1 will remediate this vulnerable dependency The CVE can be found at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250



--
This message was sent by Atlassian Jira
(v8.20.10#820010)