You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Dongjoon Hyun (JIRA)" <ji...@apache.org> on 2018/11/10 01:41:00 UTC
[jira] [Comment Edited] (SPARK-24229) Upgrade to the latest Apache
Thrift 0.10.0 release
[ https://issues.apache.org/jira/browse/SPARK-24229?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16682137#comment-16682137 ]
Dongjoon Hyun edited comment on SPARK-24229 at 11/10/18 1:40 AM:
-----------------------------------------------------------------
I also agree with [~vanzin] 's opinion.
Since this is open, [~Fokko] already made a PR to this.
I'll close this for now to save Apache Spark community effort. Please reopen this with a reproducible test case.
was (Author: dongjoon):
I also agree with [~vanzin] 's opinion.
Since this is open, [~Fokko] already made a PR to this.
I'll close this for now. Please reopen this with a reproducible test case.
> Upgrade to the latest Apache Thrift 0.10.0 release
> --------------------------------------------------
>
> Key: SPARK-24229
> URL: https://issues.apache.org/jira/browse/SPARK-24229
> Project: Spark
> Issue Type: Bug
> Components: Java API
> Affects Versions: 2.3.0
> Reporter: Ray Donnelly
> Priority: Critical
>
> According to [https://www.cvedetails.com/cve/CVE-2016-5397/]
>
> .. there are critical vulnerabilities in libthrift 0.9.3 currently vendored in Apache Spark (and then, for us, into PySpark).
>
> Can anyone help to assess the seriousness of this and what should be done about it?
>
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)
---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org