Yeah, so I pushed updated to commons and tika yesterday to the master
branch,  I also added the plugin to the build chain but stuck it under the
cve-check profile because it does slow the build down a bit whilst it
crawls the web.

Tom

On Tue, Sep 12, 2017 at 1:42 PM, lewis john mcgibbney <lewi...@apache.org>
wrote:

> Ack
> I think starting upgrades with the four modules you've highlighted would be
> a big move in the right direction.
> Is it possible to integrate this tool as part of the build and have reports
> generated automatically? This way we would know from time to time when
> newer more stable versions of a dependency are available for upgrade...
>
> On Tue, Sep 12, 2017 at 12:38 AM Tom Barber <t...@spicule.co.uk> wrote:
>
> > Thanks for the feedback chaps.
> >
> > Lewis, the report is broken down into CVEs and the tools likelyhood of
> the
> > stuff it detected being accurate.
> >
> > I think some stuff is pretty obvious, take for example Apache Commons
> > Collections, that had a Java Serialization bug that allowed for remote
> code
> > execution in 3.2.1 but is fixed in 3.2.2 (
> > https://commons.apache.org/proper/commons-collections/
> security-reports.html
> > )
> > and the issue has been in the wild since 2015. We can tackle simple stuff
> > like this just by shipping an updated version, I assume 3.2.1 to 3.2.2
> > shouldn't prove too arduous and update.
> >
> > Others like CVE-2016-6809 need a bit more digging as their severity is
> high
> > but confidence low, but turns out Tika did have a matlab exploit that
> > seemingly got addressed in 1.14.
> >
> > As I said,  I'm not looking to run out there and ship a big release to
> fix
> > all of these, but its worth addressing as we move forward.
> >
> > Tom
> >
> > On Mon, Sep 11, 2017 at 5:31 PM, Sean Kelly <ke...@apache.org> wrote:
> >
> > > Huh. That's a nifty tool.
> > >
> > > A little frightening.
> > >
> > > --k
> > >
> > >> Tom Barber <mailto:t...@spicule.co.uk>
> > >> 2017-09-9 at 8.03 a
> > >>
> > >> Hi folks
> > >>
> > >> This isn't supposed to be an alarmist email, but quite enlightening
> all
> > >> the
> > >> same.
> > >>
> > >> I saw a link to a plugin on the Drill mailing list called Dependency
> > Check
> > >> Report so I wired it into my OODT repo amongst others to see what was
> > >> flagged up since the Struts fallout.
> > >>
> > >> Anyway, of course its unlikely but not out of the question to run OODT
> > >> fronting on to the interwebs so I think this is decent food for
> thought
> > as
> > >> to why its useful to keep dependencies up to date as much as possible.
> > >>
> > >> Here's a selection of the output:
> > >>
> > >> https://www.dropbox.com/s/2ida8dk54yleedo/curator-webapp.html?dl=0
> > >> https://www.dropbox.com/s/wgt1facgjhqiqkq/fmbrowser.html?dl=0
> > >> https://www.dropbox.com/s/o8kqcaktplzjy4y/metadata.html?dl=0
> > >> https://www.dropbox.com/s/cli4pj4jc564f16/pge.html?dl=0
> > >>
> > >> Of course there is a bunch of repetition in there and plenty that
> aren't
> > >> over the top severe, some may also be false positives, but as we work
> > >> through to OODT 2.0 with the new stuff and chopping out the old stuff,
> > >> reducing these as much as possible I would posture.
> > >>
> > >> Tom
> > >>
> > >>
> >
> --
> http://home.apache.org/~lewismc/
> @hectorMcSpector
> http://www.linkedin.com/in/lmcgibbney
>

Reply via email to