You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This upgrade of the Jackson libraries from version 2.15.2 to 2.18.6 is a minor version update that includes several notable changes and potential breaking behavioral shifts.
Key Changes & Risks:
Kotlin Version Support: Jackson 2.18 drops support for Kotlin 1.7.x. If your project uses Kotlin, you must ensure you are using version 1.8, 1.9, or 2.0 to maintain compatibility.
Stricter Number Deserialization: As of version 2.17, Jackson has stricter rules for coercing numbers from strings. For example, a string with a leading zero like "07" will no longer be deserialized as a numeric type (like an Enum index). This could lead to JsonMappingException if your application relies on this behavior.
Internal Property Introspection Rewrite: Version 2.18 includes a major internal rewrite of the POJO property introspection logic. While this was done to fix long-standing bugs, such a significant change introduces a risk of subtle, unintended behavioral changes in serialization and deserialization. Several bug fixes related to this rewrite were issued in patch releases, which are included in this upgrade.
Security-Related Default Change: In version 2.16, the default for StreamReadFeature.INCLUDE_SOURCE_IN_LOCATION was changed to false to avoid leaking information in error messages.
Recommendation:
This upgrade carries a medium risk. It is critical to verify your project's Kotlin version if applicable. Thorough regression testing is strongly recommended, with a focus on deserialization logic, especially for objects with custom creators, complex constructors, and enums mapped from numeric strings.
Notice 🤖: This content was augmented using artificial intelligence. AI-generated content may contain errors and should be reviewed for accuracy before use.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Snyk has created this PR to fix 1 vulnerabilities in the maven dependencies of this project.
Snyk changed the following file(s):
pom.xmlVulnerabilities that will be fixed with an upgrade:
SNYK-JAVA-COMFASTERXMLJACKSONCORE-15365924
2.15.2->2.18.6com.fasterxml.jackson.datatype:jackson-datatype-jsr310:
2.15.2->2.18.6com.fasterxml.jackson.module:jackson-module-scala_2.12:
2.15.2->2.18.6No Path FoundProof of ConceptBreaking Change Risk
Important
Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.
For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic
Learn how to fix vulnerabilities with free interactive lessons:
🦉 Allocation of Resources Without Limits or Throttling