You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Sean Owen (JIRA)" <ji...@apache.org> on 2017/07/11 15:26:00 UTC
[jira] [Commented] (SPARK-21373) Update Jetty to 9.3.20.v20170531
to fix CVE-2017-9735
[ https://issues.apache.org/jira/browse/SPARK-21373?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16082380#comment-16082380 ]
Sean Owen commented on SPARK-21373:
-----------------------------------
As I mentioned on the email thread, I don't believe this affects Spark, because Spark doesn't use container-provided authentication. We can definitely upgrade, but I would not say this is resolving a CVE. (Or else, someone would need to clarify how this affects Spark)
> Update Jetty to 9.3.20.v20170531 to fix CVE-2017-9735
> -----------------------------------------------------
>
> Key: SPARK-21373
> URL: https://issues.apache.org/jira/browse/SPARK-21373
> Project: Spark
> Issue Type: Bug
> Components: Spark Core
> Affects Versions: 2.2.0
> Reporter: Kazuaki Ishizaki
>
> This is derived from https://issues.apache.org/jira/browse/FELIX-5664. [~aroberts] let me know the CVE.
> Spark 2.2 uses jetty 9.3.11.v20160721 that is sensitive to CVE-2017-9735
> * https://nvd.nist.gov/vuln/detail/CVE-2017-9735
> * https://github.com/eclipse/jetty.project/issues/1556
> We should upgrade jetty to 9.3.20.v20170531 that has released to fix the CVE.
--
This message was sent by Atlassian JIRA
(v6.4.14#64029)
---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org