Hey Fokko,

I'm not sure that's enough to persuade our security teams not to upgrade.
They usually scan for vulnerable versions and send security tickets
regardless of the attack path.
I think the question is, what's the upgrade path for users having to
upgrade?

p.s. I missed the PR[1] for 1.8.x, which has already been merged.

1. https://github.com/apache/iceberg/pull/12767

Thanks,
Manu

On Sun, Apr 13, 2025 at 4:54 AM Fokko Driesprong <fo...@apache.org> wrote:

> Hey Manu,
>
> Thanks for bringing this up. Sorry for not getting back to you sooner. I
> saw the ping on GitHub, but I was traveling and at the summit, so I didn't
> get to it. The main question is, do we know if the vulnerable code path is
> used by Iceberg? I put in a breakpoint at the checkSecurity
> <https://github.com/apache/parquet-java/pull/3169/files#diff-843b7d69e1ab11efea5f9cbb3cdef97018962430525040a2a5c3eed0fb5848a3R293>
> method and ran the test suite of the parquet module, but it didn't
> trigger on my end.
>
> Kind regards,
> Fokko
>
>
> Op za 12 apr 2025 om 16:50 schreef Manu Zhang <owenzhang1...@gmail.com>:
>
>> Hi all,
>>
>> https://nvd.nist.gov/vuln/detail/CVE-2025-30065 (10.0 critical) has been
>> fixed on the main branch for 1.9+ (upgrade parquet to 1.15.1). Shall we fix
>> on 1.8.x, 1.7.x and 1.6.x?
>>
>> There's an open issue[1] and PRs for 1.7.x[2] and 1.6.x[3]
>>
>> 1. https://github.com/apache/iceberg/issues/12749
>> 2. https://github.com/apache/iceberg/pull/12778
>> 3. https://github.com/apache/iceberg/pull/12780
>>
>>
>> Thanks,
>> Manu
>>
>

Reply via email to