vinayak shedgeri created ZEPPELIN-3793: ------------------------------------------
Summary: Zeppelin uses 0.9.2 org.apache.thrift which has security vulnerability CVE-2015-3254 Key: ZEPPELIN-3793 URL: https://issues.apache.org/jira/browse/ZEPPELIN-3793 Project: Zeppelin Issue Type: Bug Components: zeppelin-interpreter Affects Versions: 0.8.0 Reporter: vinayak shedgeri Fix For: 0.8.0 Zeppelin uses org.apache.thrift:0.9.2 which has following security vulnerability. Vulnerability details: Number:CVE-2015-3254 Description: The client libraries in Apache Thrift before 0.9.3 might allow remote authenticated users to cause a denial of service (infinite recursion) via vectors involving the skip function. (source:https://www.cvedetails.com/cve/CVE-2015-3254/) The Apache Thrift Go client library exposed the potential during code generation for command injection due to using an external formatting tool. Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0. (source:https://www.cvedetails.com/cve/CVE-2016-5397/ [)|https://www.cvedetails.com/cve/CVE-2016-5397/] Is there any upgrade/alternate planned for above issue? When i used org.apache.thrift 0.10.0. and 0.11.0 shows compilation error when i build from source -- This message was sent by Atlassian JIRA (v7.6.3#76005)