Skip to content

Commit

Permalink
Upgrade okhttp, kotlin-stdlib, junit fixing vulnerabilities (#1361)
Browse files Browse the repository at this point in the history
- Upgrade okttp to 4.10.0 fixing Information Exposure vuln

Upgrade com.squareup.okhttp3:okhttp from 4.8.1 to 4.10.0
fixing an information exposure vulnerability:
https://security.snyk.io/vuln/SNYK-JAVA-COMSQUAREUPOKHTTP3-2958044

This indirectly upgrades org.jetbrains.kotlin:kotlin-stdlib from
1.3.72 to 1.6.20 fixing an improper locking vulnerability:
https://nvd.nist.gov/vuln/detail/CVE-2022-24329

- Upgrade to junit 4.13.2 fixing Information Exposure (CVE-2020-15250)

Upgrade junit from 4.13 to 4.13.2 fixing an Information Exposure
vulnerability: https://nvd.nist.gov/vuln/detail/CVE-2020-15250
  • Loading branch information
julianladisch committed Aug 29, 2022
1 parent 65f5ffe commit 3fb15f5
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ subprojects {
dependencies {
compile "com.carrotsearch.thirdparty:simple-xml-safe:2.7.1"
compile "com.google.guava:guava:30.1.1-jre"
compile "com.squareup.okhttp3:okhttp:4.8.1"
compile "com.squareup.okhttp3:okhttp:4.10.0"
compile "com.fasterxml.jackson.core:jackson-annotations:2.13.2"
compile "com.fasterxml.jackson.core:jackson-core:2.13.2"
compile "com.fasterxml.jackson.core:jackson-databind:2.13.2.2"
Expand All @@ -63,7 +63,7 @@ subprojects {
compileOnly "com.github.spotbugs:spotbugs-annotations:4.1.2"

testImplementation "com.squareup.okhttp3:mockwebserver:4.8.1"
testImplementation "junit:junit:4.13"
testImplementation "junit:junit:4.13.2"
}

[compileJava, compileTestJava].each() {
Expand Down Expand Up @@ -362,7 +362,7 @@ import org.gradle.internal.os.OperatingSystem;

project(':functional') {
dependencies {
compile "junit:junit:4.13"
compile "junit:junit:4.13.2"
compile project(':api')
compile project(':adminapi')
}
Expand Down

0 comments on commit 3fb15f5

Please sign in to comment.