Skip to content

[Snyk] Security upgrade org.apache.cassandra:cassandra-all from 3.11.14 to 4.0.11#60

Open
bharadwaj-k wants to merge 1 commit intomasterfrom
snyk-fix-eb9cd15b5e82c2350a27229c83519524
Open

[Snyk] Security upgrade org.apache.cassandra:cassandra-all from 3.11.14 to 4.0.11#60
bharadwaj-k wants to merge 1 commit intomasterfrom
snyk-fix-eb9cd15b5e82c2350a27229c83519524

Conversation

@bharadwaj-k
Copy link
Copy Markdown

This PR was automatically created by Snyk using the credentials of a real user.


Snyk has created this PR to fix one or more vulnerable packages in the `maven` dependencies of this project.

Changes included in this PR

  • Changes to the following files to upgrade the vulnerable dependencies to a fixed version:
    • pom.xml

Vulnerabilities that will be fixed

With an upgrade:
Severity Priority Score (*) Issue Upgrade Breaking Change Exploit Maturity Reachability
low severity 540/1000
Why? Proof of Concept exploit, Is reachable, Has a fix available, CVSS 3.3
Information Disclosure
SNYK-JAVA-COMGOOGLEGUAVA-1015415
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept Reachable
medium severity 445/1000
Why? Has a fix available, CVSS 5.9
Deserialization of Untrusted Data
SNYK-JAVA-COMGOOGLEGUAVA-32236
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes No Known Exploit No Path Found
low severity 315/1000
Why? Has a fix available, CVSS 3.3
Creation of Temporary File in Directory with Insecure Permissions
SNYK-JAVA-COMGOOGLEGUAVA-5710356
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes No Known Exploit No Path Found
medium severity 520/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Integer Overflow or Wraparound
SNYK-JAVA-ORGXERIALSNAPPY-5710959
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found
high severity 600/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGXERIALSNAPPY-5710960
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found
medium severity 520/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 5.9
Integer Overflow or Wraparound
SNYK-JAVA-ORGXERIALSNAPPY-5710961
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found
high severity 525/1000
Why? Has a fix available, CVSS 7.5
Denial of Service (DoS)
SNYK-JAVA-ORGYAML-2806360
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes No Known Exploit No Path Found
low severity 410/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016888
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found
low severity 335/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016889
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes No Known Exploit No Path Found
medium severity 440/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 4.3
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3016891
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found
low severity 335/1000
Why? Has a fix available, CVSS 3.7
Stack-based Buffer Overflow
SNYK-JAVA-ORGYAML-3113851
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes No Known Exploit No Path Found
medium severity 555/1000
Why? Proof of Concept exploit, Has a fix available, CVSS 6.6
Arbitrary Code Execution
SNYK-JAVA-ORGYAML-3152153
org.apache.cassandra:cassandra-all:
3.11.14 -> 4.0.11
Yes Proof of Concept No Path Found

(*) Note that the real score may have changed since the PR was raised.

Check the changes in this PR to ensure they won't cause issues with your project.


Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report

🛠 Adjust project settings

📚 Read more about Snyk's upgrade and patch logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Creation of Temporary File in Directory with Insecure Permissions
🦉 Denial of Service (DoS)
🦉 Arbitrary Code Execution

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants