[ 
https://issues.apache.org/jira/browse/FLINK-36920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17942139#comment-17942139
 ] 

Robert Metzger commented on FLINK-36920:
----------------------------------------

Thanks Guyla, merged to release-1.10 in 
dfebb3f506f4556dddeafaaa3f866a75b8e3bf5f, even though I don't think it will 
ever get released ;) 

> Update org.quartz-schedule:quartz in flink-autoscaler module from 2.3.2 to 
> 2.4.0
> --------------------------------------------------------------------------------
>
>                 Key: FLINK-36920
>                 URL: https://issues.apache.org/jira/browse/FLINK-36920
>             Project: Flink
>          Issue Type: Improvement
>          Components: Kubernetes Operator
>    Affects Versions: 1.10.0
>            Reporter: Anupam Aggarwal
>            Assignee: Anupam Aggarwal
>            Priority: Minor
>              Labels: pull-request-available
>             Fix For: kubernetes-operator-1.10.0, kubernetes-operator-1.11.0
>
>
> Update dependency on org.quartz-scheduler:quartz used in flink-autoscaler 
> module from 2.3.2 to 2.4.0
>  
> *Vulnerability info:*
> cve-2023-39017
> quartz-jobs 2.3.2 and below was discovered to contain a code injection 
> vulnerability in the component 
> org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is 
> exploited via passing an unchecked argument. NOTE: this is disputed by 
> multiple parties because it is not plausible that untrusted user input would 
> reach the code location where injection must occur.
> More details are at: [https://nvd.nist.gov/vuln/detail/cve-2023-39017] 
> *Proposed fix*
> Bumping the dependency from 2.3.2 to 2.4.0 



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to