You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flink.apache.org by "Chesnay Schepler (JIRA)" <ji...@apache.org> on 2018/09/08 07:16:00 UTC

[jira] [Comment Edited] (FLINK-10303) Fix critical vulnerabilities Python API

    [ https://issues.apache.org/jira/browse/FLINK-10303?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16607937#comment-16607937 ] 

Chesnay Schepler edited comment on FLINK-10303 at 9/8/18 7:15 AM:
------------------------------------------------------------------

How can I verify that bumping the version to 2.7.1 is not adding more security vulnerabilities? i.e., how was this detected?


was (Author: zentol):
How can I verify that bumping the version to 2.7.1 is not adding more security vulnerabilities?

> Fix critical vulnerabilities Python API
> ---------------------------------------
>
>                 Key: FLINK-10303
>                 URL: https://issues.apache.org/jira/browse/FLINK-10303
>             Project: Flink
>          Issue Type: Improvement
>          Components: Python API
>    Affects Versions: 1.6.0
>            Reporter: Konstantin Knauf
>            Priority: Major
>
> A user has reported two "critical" vulnerabilities in the Python API, which we should probably fix: 
> * https://nvd.nist.gov/vuln/detail/CVE-2016-4000
> * https://cwe.mitre.org/data/definitions/384.html in flink-streaming-python_2.11-1.6.0.jar <= pip-1.6-py2.py3-none-any.whl <= sessions.py : [2.1.0, 2.6.0)
> For users, who don't need the Python API, an easy work-around is exclude the flink-streaming-python_2.11.jar from the distribution. 
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)