This is an automated email from the ASF dual-hosted git repository.

btellier pushed a commit to branch master
in repository https://gitbox.apache.org/repos/asf/james-project.git


The following commit(s) were added to refs/heads/master by this push:
     new c920db1  [UPGRADE] JSOUP 1.14.1 -> 1.14.2 to address CVE-2021-37714
c920db1 is described below

commit c920db144998ce1a9dc8521a1c6592bb413d9c77
Author: Benoit Tellier <[email protected]>
AuthorDate: Fri Aug 20 20:00:50 2021 +0700

    [UPGRADE] JSOUP 1.14.1 -> 1.14.2 to address CVE-2021-37714
    
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37714
    
    jsoup is a Java library for working with HTML. Those using jsoup versions
    prior to 1.14.2 to parse untrusted HTML or XML may be vulnerable to DOS
    attacks. If the parser is run on user supplied input, an attacker may supply
    content that causes the parser to get stuck (loop indefinitely until
    cancelled), to complete more slowly than usual, or to throw an unexpected
    exception. This effect may support a denial of service attack. The issue is
    patched in version 1.14.2. There are a few available workarounds. Users may
    rate limit input parsing, limit the size of inputs based on system 
resources,
    and/or implement thread watchdogs to cap and timeout parse runtimes.
---
 pom.xml | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/pom.xml b/pom.xml
index 632605f..cce10fe 100644
--- a/pom.xml
+++ b/pom.xml
@@ -2577,7 +2577,7 @@
             <dependency>
                 <groupId>org.jsoup</groupId>
                 <artifactId>jsoup</artifactId>
-                <version>1.14.1</version>
+                <version>1.14.2</version>
             </dependency>
             <dependency>
                 <groupId>org.junit.jupiter</groupId>

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to