You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@zeppelin.apache.org by "vinayak shedgeri (JIRA)" <ji...@apache.org> on 2018/09/26 10:53:00 UTC
[jira] [Created] (ZEPPELIN-3793) Zeppelin uses 0.9.2
org.apache.thrift which has security vulnerability CVE-2015-3254
vinayak shedgeri created ZEPPELIN-3793:
------------------------------------------
Summary: Zeppelin uses 0.9.2 org.apache.thrift which has security vulnerability CVE-2015-3254
Key: ZEPPELIN-3793
URL: https://issues.apache.org/jira/browse/ZEPPELIN-3793
Project: Zeppelin
Issue Type: Bug
Components: zeppelin-interpreter
Affects Versions: 0.8.0
Reporter: vinayak shedgeri
Fix For: 0.8.0
Zeppelin uses org.apache.thrift:0.9.2 which has following security vulnerability.
Vulnerability details:
Number:CVE-2015-3254
Description:
The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function.
(source:https://www.cvedetails.com/cve/CVE-2015-3254/)
The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.
(source:https://www.cvedetails.com/cve/CVE-2016-5397/ [)|https://www.cvedetails.com/cve/CVE-2016-5397/]
Is there any upgrade/alternate planned for above issue?
When i used org.apache.thrift 0.10.0. and 0.11.0 shows compilation error when i build from source
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)