th555555 opened a new pull request, #26545:
URL: https://github.com/apache/flink/pull/26545

   This PR addresses a critical security vulnerability (Command Injection) in 
the extractTarFileUsingTar method of CompressionUtils.
   
   Modified extractTarFileUsingTar to use a stream-based approach that passes 
file content through stdin instead of passing file paths to shell commands
   This approach eliminates the possibility of command injection via malicious 
file paths
   Maintains the same functionality while improving security
   
   References
   https://www.cve.org/CVERecord?id=CVE-2022-25168
   
https://github.com/apache/hadoop/commit/cae749b076f35f0be13a926ee8cfbb7ce4402746
   
   This change is a trivial rework / code cleanup without any test coverage.
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@flink.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to