You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@flink.apache.org by "Patrick Lucas (JIRA)" <ji...@apache.org> on 2018/08/02 11:23:00 UTC
[jira] [Commented] (FLINK-10007) Security vulnerability in website
build infrastructure
[ https://issues.apache.org/jira/browse/FLINK-10007?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16566645#comment-16566645 ]
Patrick Lucas commented on FLINK-10007:
---------------------------------------
FWIW, this vulnerability has to do with a specific JSON string being able to crash ruby, which could result in DoS to a service running it. It's basically inconsequential to us, but might as well check it off the list I guess.
https://www.cvedetails.com/cve/CVE-2017-16516/
> Security vulnerability in website build infrastructure
> ------------------------------------------------------
>
> Key: FLINK-10007
> URL: https://issues.apache.org/jira/browse/FLINK-10007
> Project: Flink
> Issue Type: Bug
> Components: Project Website
> Reporter: Fabian Hueske
> Priority: Critical
>
> We've got a notification from Apache INFRA about a potential security vulnerability:
> {quote}
> We found a potential security vulnerability in a repository for which you have been granted security alert access.
> @apache apache/flink-web
> Known high severity security vulnerability detected in yajl-ruby < 1.3.1 defined in Gemfile.
> Gemfile update suggested: yajl-ruby ~> 1.3.1.
> {quote}
> This is a problem with the build environment of the website, i.e., this dependency is not distributed or executed with Flink but only run when the website is updated.
> Nonetheless, we should of course update the dependency.
--
This message was sent by Atlassian JIRA
(v7.6.3#76005)