Build: #820 was successful Scheduled with changes by 3 people

Stages & jobs

  1. Default Stage

Build result summary

Details

Completed
Queue duration
1 minute
Duration
1 minute
Labels
None
Revision
1c222ff062363b65982935e2fb989aae527b5b2e
Successful since
#784 ()

Code commits

Author Commit Message Commit date
dkayiwa <kayiwadaniel@gmail.com> dkayiwa <kayiwadaniel@gmail.com> 1c222ff062363b65982935e2fb989aae527b5b2e increasing the maven release plugin version (cherry picked from commit cc6a678f109acad27263e2baf01fd909445c52d0)
Daniel Kayiwa Daniel Kayiwa 15f98cff0ae691e6c4b4c4b79b425911f51e4a14 Merge pull request #1758 from jart/patch-1
Upgrade Apache Commons Collections to v3.2.2
Justine Tunney <jtunney@gmail.com> Justine Tunney <jtunney@gmail.com> 07440b9823d7c62342846d0e788dacbe069be8b0 Upgrade Apache Commons Collections to v3.2.2
Version 3.2 has a CVSS 10.0 vulnerability. That's the worst kind of
vulnerability that exists. By merely existing on the classpath, this
library causes the Java serialization parser for the entire JVM process
to go from being a state machine to a turing machine. A turing machine
with an exec() function!

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-8103
https://commons.apache.org/proper/commons-collections/security-reports.html
http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/