Update vulnerable version of cron-utils (#1942)

* Update lock files

* Replace usage of org.apache.commons.lang3 with guava

* Update vulnerable version of cron-utils

Update cron-util from version 9.1.3 to 9.1.6.
Version 9.1.6 fixes an arbitrary code execution
vulnerability (CVE-2021-41269).
SCM-Manager is not affected by this issue,
because it is related to the el parsing
of an annotation which we don't use.
This commit is contained in:
Sebastian Sdorra
2022-02-01 18:06:53 +01:00
committed by GitHub
parent 44be389d0c
commit 466334aaa7
9 changed files with 17 additions and 17 deletions

View File

@@ -153,7 +153,7 @@ org.slf4j:slf4j-api:1.7.25=swaggerDeps
org.slf4j:slf4j-api:1.7.30=annotationProcessor,compileClasspath,default,runtimeClasspath,runtimePluginElements,scmCoreDependency,testCompileClasspath,testRuntimeClasspath
org.tmatesoft.sqljet:sqljet:1.1.14=compileClasspath,default,runtimeClasspath,testCompileClasspath,testRuntimeClasspath
org.yaml:snakeyaml:1.26=swaggerDeps
sonia.scm:scm-webapp:2.29.2-SNAPSHOT=scmServer
sonia.scm:scm-webapp:2.30.2-SNAPSHOT=scmServer
sonia.svnkit:svnkit-dav:1.10.3-scm1=compileClasspath,default,runtimeClasspath,testCompileClasspath,testRuntimeClasspath
sonia.svnkit:svnkit:1.10.3-scm1=compileClasspath,default,runtimeClasspath,testCompileClasspath,testRuntimeClasspath
empty=archives,optionalPlugin,plugin