[jira] [Commented] (JAMES-2570) Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0

2018-10-23 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16660351#comment-16660351
 ] 

ASF GitHub Bot commented on JAMES-2570:
---

Github user trantienduchn closed the pull request at:

https://github.com/apache/james-project/pull/138


> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> 
>
> Key: JAMES-2570
> URL: https://issues.apache.org/jira/browse/JAMES-2570
> Project: James Server
>  Issue Type: Improvement
>Reporter: Trần Tiến Đức
>Priority: Major
>
> h5. CVE-2018-9159 [More 
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via 
> various representations of absolute or relative pathnames, as demonstrated by 
> file: URLs and directory traversal sequences. NOTE: this product is unrelated 
> to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org



[jira] [Commented] (JAMES-2570) Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0

2018-10-23 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16660350#comment-16660350
 ] 

ASF GitHub Bot commented on JAMES-2570:
---

Github user trantienduchn commented on the issue:

https://github.com/apache/james-project/pull/138
  
wrong destination repository. close!


> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> 
>
> Key: JAMES-2570
> URL: https://issues.apache.org/jira/browse/JAMES-2570
> Project: James Server
>  Issue Type: Improvement
>Reporter: Trần Tiến Đức
>Priority: Major
>
> h5. CVE-2018-9159 [More 
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via 
> various representations of absolute or relative pathnames, as demonstrated by 
> file: URLs and directory traversal sequences. NOTE: this product is unrelated 
> to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org



[jira] [Commented] (JAMES-2570) Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0

2018-10-23 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/JAMES-2570?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16660347#comment-16660347
 ] 

ASF GitHub Bot commented on JAMES-2570:
---

GitHub user trantienduchn opened a pull request:

https://github.com/apache/james-project/pull/138

JAMES-2570 Upgrade spark java from 2.6.0 to 2.8.0

[CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
moderate severity
Vulnerable versions: < 2.7.2
Patched version: 2.7.2
In Spark before 2.7.2, a remote attacker can read unintended static files 
via various representations of absolute or relative pathnames, as demonstrated 
by file: URLs and directory traversal sequences. NOTE: this product is 
unrelated to Ignite Realtime Spark.

You can merge this pull request into a Git repository by running:

$ git pull https://github.com/trantienduchn/james-project JAMES-2570

Alternatively you can review and apply these changes as the patch at:

https://github.com/apache/james-project/pull/138.patch

To close this pull request, make a commit to your master/trunk branch
with (at least) the following in the commit message:

This closes #138


commit 8c9a790d4e7281416ddae22e925bb6616cfb7725
Author: tran tien duc 
Date:   2018-10-23T08:14:17Z

JAMES-2570 Upgrade spark java from 2.6.0 to 2.8.0




> Upgrade com.sparkjava:spark-core from 2.6.0 to 2.8.0
> 
>
> Key: JAMES-2570
> URL: https://issues.apache.org/jira/browse/JAMES-2570
> Project: James Server
>  Issue Type: Improvement
>Reporter: Trần Tiến Đức
>Priority: Major
>
> h5. CVE-2018-9159 [More 
> information|https://nvd.nist.gov/vuln/detail/CVE-2018-9159](https://nvd.nist.gov/vuln/detail/CVE-2018-9159)
> moderate severity
> *Vulnerable versions:* < 2.7.2
> *Patched version:* 2.7.2
> In Spark before 2.7.2, a remote attacker can read unintended static files via 
> various representations of absolute or relative pathnames, as demonstrated by 
> file: URLs and directory traversal sequences. NOTE: this product is unrelated 
> to Ignite Realtime Spark.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: server-dev-unsubscr...@james.apache.org
For additional commands, e-mail: server-dev-h...@james.apache.org