vinayak shedgeri created ZEPPELIN-3793:
------------------------------------------

             Summary: Zeppelin uses 0.9.2 org.apache.thrift which has security 
vulnerability CVE-2015-3254
                 Key: ZEPPELIN-3793
                 URL: https://issues.apache.org/jira/browse/ZEPPELIN-3793
             Project: Zeppelin
          Issue Type: Bug
          Components: zeppelin-interpreter
    Affects Versions: 0.8.0
            Reporter: vinayak shedgeri
             Fix For: 0.8.0


Zeppelin uses org.apache.thrift:0.9.2 which has following security 
vulnerability.
Vulnerability details:
Number:CVE-2015-3254
Description:

The client libraries in Apache Thrift before 0.9.3 might allow remote 
authenticated users to cause a denial of service (infinite recursion) via 
vectors involving the skip function.

(source:https://www.cvedetails.com/cve/CVE-2015-3254/)

The Apache Thrift Go client library exposed the potential during code 
generation for command injection due to using an external formatting tool. 
Affected Apache Thrift 0.9.3 and older, Fixed in Apache Thrift 0.10.0.

(source:https://www.cvedetails.com/cve/CVE-2016-5397/ 
[)|https://www.cvedetails.com/cve/CVE-2016-5397/]

Is there any upgrade/alternate planned for above issue?

When i used org.apache.thrift 0.10.0. and 0.11.0 shows compilation error when i 
build from source



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to