You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@spark.apache.org by "Sean Owen (JIRA)" <ji...@apache.org> on 2017/07/11 15:26:00 UTC

[jira] [Commented] (SPARK-21373) Update Jetty to 9.3.20.v20170531 to fix CVE-2017-9735

    [ https://issues.apache.org/jira/browse/SPARK-21373?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16082380#comment-16082380 ] 

Sean Owen commented on SPARK-21373:
-----------------------------------

As I mentioned on the email thread, I don't believe this affects Spark, because Spark doesn't use container-provided authentication. We can definitely upgrade, but I would not say this is resolving a CVE. (Or else, someone would need to clarify how this affects Spark)

> Update Jetty to 9.3.20.v20170531 to fix CVE-2017-9735
> -----------------------------------------------------
>
>                 Key: SPARK-21373
>                 URL: https://issues.apache.org/jira/browse/SPARK-21373
>             Project: Spark
>          Issue Type: Bug
>          Components: Spark Core
>    Affects Versions: 2.2.0
>            Reporter: Kazuaki Ishizaki
>
> This is derived from https://issues.apache.org/jira/browse/FELIX-5664. [~aroberts] let me know the CVE.
> Spark 2.2 uses jetty 9.3.11.v20160721 that is sensitive to CVE-2017-9735
> * https://nvd.nist.gov/vuln/detail/CVE-2017-9735
> * https://github.com/eclipse/jetty.project/issues/1556
> We should upgrade jetty to 9.3.20.v20170531 that has released to fix the CVE.



--
This message was sent by Atlassian JIRA
(v6.4.14#64029)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscribe@spark.apache.org
For additional commands, e-mail: issues-help@spark.apache.org