[ 
https://issues.apache.org/jira/browse/TIKA-2801?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16733230#comment-16733230
 ] 

Hudson commented on TIKA-2801:
------------------------------

SUCCESS: Integrated in Jenkins build Tika-trunk #1612 (See 
[https://builds.apache.org/job/Tika-trunk/1612/])
TIKA-2801 -- add ossindex-maven-plugin and upgrade vulnerable (tallison: 
[https://github.com/apache/tika/commit/0b286d3efcfd1aa50f0d7fed50b5f39a6a09cf38])
* (edit) tika-dl/pom.xml
* (edit) tika-example/pom.xml
* (edit) tika-nlp/pom.xml
* (edit) tika-parent/pom.xml
* (edit) tika-parsers/pom.xml
* (edit) tika-eval/pom.xml


> Tika includes 2 vulnerable components
> -------------------------------------
>
>                 Key: TIKA-2801
>                 URL: https://issues.apache.org/jira/browse/TIKA-2801
>             Project: Tika
>          Issue Type: Task
>          Components: parser
>    Affects Versions: 1.20
>            Reporter: Maxim Solodovnik
>            Priority: Critical
>
> Maven audit plugin reports 2 vulnerable components:
> com.google.guava:guava:jar:17.0:compile
>  * [CVE-2018-10237] Deserialization of Untrusted Data (5.9); 
> https://ossindex.sonatype.org/vuln/24585a7f-eb6b-4d8d-a2a9-a6f16cc7c1d0
> com.google.protobuf:protobuf-java:jar:2.5.0:compile
>  * [CVE-2015-5237] Improper Restriction of Operations within the Bounds of a 
> Memory Buffer (8.8); 
> https://ossindex.sonatype.org/vuln/d47d20ab-eb2a-4cfd-8064-bbf6283649cb
> Maybe it worth to add {{audit}} plugin to the build/release?
> {{mvn org.sonatype.ossindex.maven:ossindex-maven-plugin:audit -f pom.xml}}



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to