Skip to:
Upgrade com.puppycrawl.tools:checkstyle to version 8.29 or later. For example:
Always verify the validity and compatibility of suggestions with your codebase.
moderate severity
*Vulnerable versions:* < 8.29
*Patched version:* 8.29
Due to an incomplete fix for CVE-2019-9658, checkstyle was still vulnerable to XML External Entity (XXE) Processing.
Thanks, !
Pull request ready for code review: https://github.com/folio-org/edge-sip2/pull/45Obsoletes https://github.com/folio-org/edge-sip2/pull/41Note that I don't have write permission to that repository, please also merge the PR after it has been accepted in the code review.
Remediation
Upgrade com.puppycrawl.tools:checkstyle to version 8.29 or later. For example:
Always verify the validity and compatibility of suggestions with your codebase.
GHSA-763g-fqq7-48wg
moderate severity
*Vulnerable versions:* < 8.29
*Patched version:* 8.29
Due to an incomplete fix for CVE-2019-9658, checkstyle was still vulnerable to XML External Entity (XXE) Processing.