[ 
https://issues.apache.org/jira/browse/TIKA-2801?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Tim Allison resolved TIKA-2801.
-------------------------------
       Resolution: Fixed
         Assignee: Tim Allison
    Fix Version/s: 1.21

I think I just took care of this on TIKA-2804, TIKA-2824, TIKA-2854.

> Tika includes 2 vulnerable components
> -------------------------------------
>
>                 Key: TIKA-2801
>                 URL: https://issues.apache.org/jira/browse/TIKA-2801
>             Project: Tika
>          Issue Type: Task
>          Components: parser
>    Affects Versions: 1.20
>            Reporter: Maxim Solodovnik
>            Assignee: Tim Allison
>            Priority: Critical
>             Fix For: 1.21
>
>
> Maven audit plugin reports 2 vulnerable components:
> com.google.guava:guava:jar:17.0:compile
>  * [CVE-2018-10237] Deserialization of Untrusted Data (5.9); 
> https://ossindex.sonatype.org/vuln/24585a7f-eb6b-4d8d-a2a9-a6f16cc7c1d0
> com.google.protobuf:protobuf-java:jar:2.5.0:compile
>  * [CVE-2015-5237] Improper Restriction of Operations within the Bounds of a 
> Memory Buffer (8.8); 
> https://ossindex.sonatype.org/vuln/d47d20ab-eb2a-4cfd-8064-bbf6283649cb
> Maybe it worth to add {{audit}} plugin to the build/release?
> {{mvn org.sonatype.ossindex.maven:ossindex-maven-plugin:audit -f pom.xml}}



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to