We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The tea library is a transitive dependency of some other aliyun libraries which my company uses.
Unfortunately, this library is using a non-maintained version of okhttp which has a known security vulnerability disclosure:
https://nvd.nist.gov/vuln/detail/CVE-2021-0341
The dependency is from here: https://github.com/aliyun/tea-java/blob/master/pom.xml#L68
The maintainers of okhttp indicate that they will not patch the v3 library with a correction. However, the more recent 4.x series has been fixed.
Can this library be upgraded and then re-released using okhttp v4 or newer?
The text was updated successfully, but these errors were encountered:
New vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2023-3635
Sorry, something went wrong.
New vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2023-0833
Can we please update the dependency?
No branches or pull requests
The tea library is a transitive dependency of some other aliyun libraries which my company uses.
Unfortunately, this library is using a non-maintained version of okhttp which has a known security vulnerability disclosure:
https://nvd.nist.gov/vuln/detail/CVE-2021-0341
The dependency is from here:
https://github.com/aliyun/tea-java/blob/master/pom.xml#L68
The maintainers of okhttp indicate that they will not patch the v3 library with a correction. However, the more recent 4.x series has been fixed.
Can this library be upgraded and then re-released using okhttp v4 or newer?
The text was updated successfully, but these errors were encountered: