This is an automated email from the ASF dual-hosted git repository.
btellier pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/james-project.git
The following commit(s) were added to refs/heads/master by this push:
new c920db1 [UPGRADE] JSOUP 1.14.1 -> 1.14.2 to address CVE-2021-37714
c920db1 is described below
commit c920db144998ce1a9dc8521a1c6592bb413d9c77
Author: Benoit Tellier <[email protected]>
AuthorDate: Fri Aug 20 20:00:50 2021 +0700
[UPGRADE] JSOUP 1.14.1 -> 1.14.2 to address CVE-2021-37714
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37714
jsoup is a Java library for working with HTML. Those using jsoup versions
prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS
attacks. If the parser is run on user supplied input, an attacker may supply
content that causes the parser to get stuck (loop indefinitely until
cancelled), to complete more slowly than usual, or to throw an unexpected
exception. This effect may support a denial of service attack. The issue is
patched in version 1.14.2. There are a few available workarounds. Users may
rate limit input parsing, limit the size of inputs based on system
resources,
and/or implement thread watchdogs to cap and timeout parse runtimes.
---
pom.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/pom.xml b/pom.xml
index 632605f..cce10fe 100644
--- a/pom.xml
+++ b/pom.xml
@@ -2577,7 +2577,7 @@
<dependency>
<groupId>org.jsoup</groupId>
<artifactId>jsoup</artifactId>
- <version>1.14.1</version>
+ <version>1.14.2</version>
</dependency>
<dependency>
<groupId>org.junit.jupiter</groupId>
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]