Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Guava version used in gradle plugins has a moderate-severity vulnerability #63

Open
bigdaz opened this issue Jan 30, 2024 · 0 comments
Open

Comments

@bigdaz
Copy link

bigdaz commented Jan 30, 2024

The dependency com.puppycrawl.tools:checkstyle:8.33 has a transitive dependency on com.google.guava:guava:29.0-jre, which has a moderate severity vulnerability.

Due to the way the dependency configurations are assembled by the plugin, it is difficult for users to upgrade to a newer version. Even if the nohttp Gradle plugin is not itself vulnerable, as more users enable Dependabot alerts for their Gradle repositories, these reports will become widespread.

This could be fixed by either updating the version of checkstyle used in the plugin, by adding a direct dependency on a patched version of guava, or by constraining the version of guava with a published dependency constraint.

@bigdaz bigdaz changed the title Checkstyle plugin used in gradle plugins has dependency with high-severity vulnerability Guava version used in gradle plugins has a moderate-severity vulnerability Jan 30, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant