[ 
https://issues.apache.org/jira/browse/FLINK-10303?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16613713#comment-16613713
 ] 

Konstantin Knauf commented on FLINK-10303:
------------------------------------------

[~Zentol] I think, this was done with Sonar. I just added the maven dependency 
check plugin to flink-streaming-python 
(https://jeremylong.github.io/DependencyCheck/dependency-check-maven/index.html 
). It finds CVE-2016-4000 as well, so could be used to verify. About the other 
one, I am not sure. It is not found by the OWASP dependency check as far as I 
can tell. It looks as if it is a vulnerability in `pip`, doesn't it? 

> Fix critical vulnerabilities Python API
> ---------------------------------------
>
>                 Key: FLINK-10303
>                 URL: https://issues.apache.org/jira/browse/FLINK-10303
>             Project: Flink
>          Issue Type: Improvement
>          Components: Python API
>    Affects Versions: 1.6.0
>            Reporter: Konstantin Knauf
>            Priority: Major
>
> A user has reported two "critical" vulnerabilities in the Python API, which 
> we should probably fix: 
> * https://nvd.nist.gov/vuln/detail/CVE-2016-4000
> * https://cwe.mitre.org/data/definitions/384.html in 
> flink-streaming-python_2.11-1.6.0.jar <= pip-1.6-py2.py3-none-any.whl <= 
> sessions.py : [2.1.0, 2.6.0)
> For users, who don't need the Python API, an easy work-around is exclude the 
> flink-streaming-python_2.11.jar from the distribution. 
>  



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Reply via email to