tinkerpop-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "ASF GitHub Bot (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (TINKERPOP-2032) Update jython-standalone
Date Tue, 11 Sep 2018 12:38:00 GMT

    [ https://issues.apache.org/jira/browse/TINKERPOP-2032?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16610533#comment-16610533
] 

ASF GitHub Bot commented on TINKERPOP-2032:
-------------------------------------------

GitHub user robertdale opened a pull request:

    https://github.com/apache/tinkerpop/pull/930

    TINKERPOP-2032 bump jython-standalone 2.7.1

    https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451
    
    Overview
    org.python:jython-standalone Affected versions of this package are vulnerable to Arbitrary
Code Execution by sending a serialized function to the deserializer, which in turn will execute
the code.
    
    References
    [CVE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000)
    [Jython Bug Report](http://bugs.jython.org/issue2454)
    [Fix Commit](https://hg.python.org/jython/rev/d06e29d100c0)


You can merge this pull request into a Git repository by running:

    $ git pull https://github.com/apache/tinkerpop TINKERPOP-2032

Alternatively you can review and apply these changes as the patch at:

    https://github.com/apache/tinkerpop/pull/930.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

    This closes #930
    
----
commit f70d108e0e9cace79565c658e6bac5c7e9f045ba
Author: Robert Dale <robdale@...>
Date:   2018-09-11T12:35:33Z

    TINKERPOP-2032 bump jython-standalone 2.7.1

----


> Update jython-standalone
> ------------------------
>
>                 Key: TINKERPOP-2032
>                 URL: https://issues.apache.org/jira/browse/TINKERPOP-2032
>             Project: TinkerPop
>          Issue Type: Bug
>          Components: python
>    Affects Versions: 3.3.3, 3.2.9
>            Reporter: Robert Dale
>            Assignee: Robert Dale
>            Priority: Major
>
> [https://snyk.io/vuln/SNYK-JAVA-ORGPYTHON-31451]
> Overview
>  org.python:jython-standalone Affected versions of this package are vulnerable to Arbitrary
Code Execution by sending a serialized function to the deserializer, which in turn will execute
the code.
> References
> [ CVE|https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4000]
>  [Jython Bug Report|http://bugs.jython.org/issue2454]
> [ Fix Commit|https://hg.python.org/jython/rev/d06e29d100c0]



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Mime
View raw message