You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@avro.apache.org by "Andrew May (Jira)" <ji...@apache.org> on 2021/11/16 18:11:00 UTC
[jira] [Commented] (AVRO-3111) Update Hadoop versions to prevent false-positive security reports
[ https://issues.apache.org/jira/browse/AVRO-3111?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17444701#comment-17444701 ]
Andrew May commented on AVRO-3111:
----------------------------------
Thanks for the response Ryan, I've sent an email to cpe_dictionary@nist.gov to report this to them & have linked to your response
> Update Hadoop versions to prevent false-positive security reports
> -----------------------------------------------------------------
>
> Key: AVRO-3111
> URL: https://issues.apache.org/jira/browse/AVRO-3111
> Project: Apache Avro
> Issue Type: Bug
> Components: java
> Affects Versions: 1.10.1, 1.10.2
> Environment: Docker image built on library/buildpack-deps:buster-curl ([buildpack-deps (docker.com)|https://hub.docker.com/_/buildpack-deps])
> Reporter: David L. Day
> Assignee: Ismaël Mejía
> Priority: Major
> Fix For: 1.11.0
>
>
> When installing avro-tools in a container on a debian image, my company's image scanner reports CVE-2019-17195:
> _Connect2id Nimbus JOSE+JWT before v7.9 can throw various uncaught exceptions while parsing a JWT, which could result in an application crash (potential information disclosure) or a potential authentication bypass._
> I see other Apache projects have had this CVE reported and have been fixed, but did not see where this was reported for Apache Avro Tools specifically.
--
This message was sent by Atlassian Jira
(v8.20.1#820001)