You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Mike R (Jira)" <ji...@apache.org> on 2022/06/30 14:00:00 UTC
[jira] [Updated] (NIFI-10185) Update javax.ws.rs-api To Version 3.1.0
[ https://issues.apache.org/jira/browse/NIFI-10185?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Mike R updated NIFI-10185:
--------------------------
Description: Currently, the version of javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] Updating to version 3.1 will remediate this vulnerable dependency The CVE can be found at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250 (was: Currently, the version of javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] [CVE - CVE-2020-15250 (mitre.org)|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] [ Updating to version 3.1 will remediate this vulnerable dependency|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250])
> Update javax.ws.rs-api To Version 3.1.0
> ---------------------------------------
>
> Key: NIFI-10185
> URL: https://issues.apache.org/jira/browse/NIFI-10185
> Project: Apache NiFi
> Issue Type: Improvement
> Reporter: Mike R
> Priority: Major
>
> Currently, the version of javax.ws.rs-api used is 2.1, which has a vulnerable dependency to [CVE-2020-15250. |https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250] Updating to version 3.1 will remediate this vulnerable dependency The CVE can be found at https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15250
--
This message was sent by Atlassian Jira
(v8.20.10#820010)