From dev-return-19127-archive-asf-public=cust-asf.ponee.io@ranger.apache.org Tue Sep 11 05:07:05 2018 Return-Path: X-Original-To: archive-asf-public@cust-asf.ponee.io Delivered-To: archive-asf-public@cust-asf.ponee.io Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by mx-eu-01.ponee.io (Postfix) with SMTP id 0F7CB18067A for ; Tue, 11 Sep 2018 05:07:04 +0200 (CEST) Received: (qmail 29322 invoked by uid 500); 11 Sep 2018 03:07:03 -0000 Mailing-List: contact dev-help@ranger.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@ranger.apache.org Delivered-To: mailing list dev@ranger.apache.org Received: (qmail 29311 invoked by uid 99); 11 Sep 2018 03:07:03 -0000 Received: from pnap-us-west-generic-nat.apache.org (HELO spamd4-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Tue, 11 Sep 2018 03:07:03 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd4-us-west.apache.org (ASF Mail Server at spamd4-us-west.apache.org) with ESMTP id B9443C1FCE for ; Tue, 11 Sep 2018 03:07:02 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd4-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -109.501 X-Spam-Level: X-Spam-Status: No, score=-109.501 tagged_above=-999 required=6.31 tests=[ENV_AND_HDR_SPF_MATCH=-0.5, KAM_ASCII_DIVIDERS=0.8, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, USER_IN_DEF_SPF_WL=-7.5, USER_IN_WHITELIST=-100] autolearn=disabled Received: from mx1-lw-eu.apache.org ([10.40.0.8]) by localhost (spamd4-us-west.apache.org [10.40.0.11]) (amavisd-new, port 10024) with ESMTP id ySfURckWyVuD for ; Tue, 11 Sep 2018 03:07:02 +0000 (UTC) Received: from mailrelay1-us-west.apache.org (mailrelay1-us-west.apache.org [209.188.14.139]) by mx1-lw-eu.apache.org (ASF Mail Server at mx1-lw-eu.apache.org) with ESMTP id 623EB5F19C for ; Tue, 11 Sep 2018 03:07:01 +0000 (UTC) Received: from jira-lw-us.apache.org (unknown [207.244.88.139]) by mailrelay1-us-west.apache.org (ASF Mail Server at mailrelay1-us-west.apache.org) with ESMTP id A89DCE00CB for ; Tue, 11 Sep 2018 03:07:00 +0000 (UTC) Received: from jira-lw-us.apache.org (localhost [127.0.0.1]) by jira-lw-us.apache.org (ASF Mail Server at jira-lw-us.apache.org) with ESMTP id 24A612183D for ; Tue, 11 Sep 2018 03:07:00 +0000 (UTC) Date: Tue, 11 Sep 2018 03:07:00 +0000 (UTC) From: "Qiang Zhang (JIRA)" To: dev@ranger.apache.org Message-ID: In-Reply-To: References: Subject: [jira] [Updated] (RANGER-2213) Tomcat Security Vulnerability Alert. The version of the tomcat for ranger should upgrade to 7.0.90. MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-JIRA-FingerPrint: 30527f35849b9dde25b450d4833f0394 [ https://issues.apache.org/jira/browse/RANGER-2213?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Qiang Zhang updated RANGER-2213: -------------------------------- Attachment: 0001-RANGER-2213-Tomcat-Security-Vulnerability-Alert.-The.patch > Tomcat Security Vulnerability Alert. The version of the tomcat for ranger should upgrade to 7.0.90. > --------------------------------------------------------------------------------------------------- > > Key: RANGER-2213 > URL: https://issues.apache.org/jira/browse/RANGER-2213 > Project: Ranger > Issue Type: Bug > Components: Ranger > Affects Versions: master > Reporter: Qiang Zhang > Assignee: Qiang Zhang > Priority: Major > Labels: patch > Attachments: 0001-RANGER-2213-Tomcat-Security-Vulnerability-Alert.-The.patch > > > [SECURITY] CVE-2018-1336 > Severity: High > Versions Affected: Apache Tomcat 9.0.0.M9 to 9.0.7, 8.5.0 to 8.5.30, 8.0.0.RC1 to 8.0.51, and 7.0.28 to 7.0.86. > Description: An improper handing of overflow in the UTF-8 decoder with supplementary characters can lead to an infinite loop in the decoder causing a Denial of Service. > CVE-2018-8014 > Description: The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue. > CVE-2018-8034 > Description: The host name verification when using TLS with the WebSocket client was missing. It is now enabled by default. > Versions Affected: Apache Tomcat 9.0.0.M1 to 9.0.9, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, and 7.0.35 to 7.0.88. -- This message was sent by Atlassian JIRA (v7.6.3#76005)