james-server-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "ASF GitHub Bot (JIRA)" <server-...@james.apache.org>
Subject [jira] [Commented] (JAMES-2570) Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
Date Tue, 23 Oct 2018 09:38:00 GMT

    [ https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16660347#comment-16660347
] 

ASF GitHub Bot commented on JAMES-2570:
---------------------------------------

GitHub user trantienduchn opened a pull request:

    https://github.com/apache/james-project/pull/138

    JAMES-2570 Upgrade spark java from 2.6.0 to 2.8.0

    [CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
    moderate severity
    Vulnerable versions: < 2.7.2
    Patched version: 2.7.2
    In Spark before 2.7.2, a remote attacker can read unintended static files via various
representations of absolute or relative pathnames, as demonstrated by file: URLs and directory
traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.

You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/trantienduchn/james-project JAMES-2570

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/james-project/pull/138.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #138
    
----
commit 8c9a790d4e7281416ddae22e925bb6616cfb7725
Author: tran tien duc <dtran@...>
Date:   2018-10-23T08:14:17Z

    JAMES-2570 Upgrade spark java from 2.6.0 to 2.8.0

----


> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> ----------------------------------------------------
>
>                 Key: JAMES-2570
>                 URL: https://issues.apache.org/jira/browse/JAMES-2570
>             Project: James Server
>          Issue Type: Improvement
>            Reporter: Trần Tiến Đức
>            Priority: Major
>
> h5. CVE-2018-9159 [More information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via various
representations of absolute or relative pathnames, as demonstrated by file: URLs and directory
traversal sequences. NOTE: this product is unrelated to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: server-dev-unsubscribe@james.apache.org
For additional commands, e-mail: server-dev-help@james.apache.org


Mime
View raw message