[ 
https://issues.apache.org/jira/browse/JENA-1781?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16980795#comment-16980795
 ] 

ASF subversion and git services commented on JENA-1781:
-------------------------------------------------------

Commit 9ad64c7f686cef835830f191c70bb3f112e43bd2 in jena's branch 
refs/heads/master from Andy Seaborne
[ https://gitbox.apache.org/repos/asf?p=jena.git;h=9ad64c7 ]

JENA-1781: Deal with THRIFT-5022 "isOpen"


> Upgrade Thrift to version 0.13.0
> --------------------------------
>
>                 Key: JENA-1781
>                 URL: https://issues.apache.org/jira/browse/JENA-1781
>             Project: Apache Jena
>          Issue Type: Dependency upgrade
>          Components: ARQ, OSGi
>            Reporter: Ken Treimann
>            Assignee: Andy Seaborne
>            Priority: Major
>          Time Spent: 1h
>  Remaining Estimate: 0h
>
> OWASP Dependency Check identifies Thrift version 0.12.0 as having the 
> following vulnerabilites:
> [CVE-2019-0205|https://nvd.nist.gov/vuln/detail/CVE-2019-0205|https://nvd.nist.gov/vuln/detail/CVE-2019-0210]
> [CVE-2019-0210|https://nvd.nist.gov/vuln/detail/CVE-2019-0210]
> According to 
> [CASSANDRA-15420|https://issues.apache.org/jira/browse/CASSANDRA-15420], this 
> was partially fixed in version 0.11.0, but it still gets flagged as 
> vulnerable.  [This 
> message|http://mail-archives.apache.org/mod_mbox/thrift-dev/201910.mbox/%3CVI1PR0101MB2142E0EA19F582429C3AEBCBB1920%40VI1PR0101MB2142.eurprd01.prod.exchangelabs.com%3E]
>  from the thrift-dev mailing list states that the mitigation is to upgrade to 
> version 0.13.0.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to