[ 
https://issues.apache.org/jira/browse/HIVE-28693?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17910278#comment-17910278
 ] 

Basapuram Kumar commented on HIVE-28693:
----------------------------------------

PR - [https://github.com/apache/hive/pull/5597]

 

> Bump Atlas to 2.4.0 to fix CVE's
> --------------------------------
>
>                 Key: HIVE-28693
>                 URL: https://issues.apache.org/jira/browse/HIVE-28693
>             Project: Hive
>          Issue Type: Improvement
>            Reporter: Basapuram Kumar
>            Assignee: Basapuram Kumar
>            Priority: Major
>              Labels: pull-request-available
>
> *Issue*
> The current version of Hive uses Apache Atlas 2.3.0, which transitively 
> depends on Spring Framework-5.3.21. This specific version of the Spring 
> Framework is vulnerable to CVE-2023-20863.
> *Root Cause:*
> The vulnerability exists due to the dependency on Apache Atlas 2.3.0, which 
> includes the outdated and vulnerable version of the Spring Framework (5.3.21).
> *Resolution Suggestion:*
> To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to 
> version 2.4.0, which includes an updated and secure version of the Spring 
> Framework-5.3.39.
>  
> [CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
> ```
> In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ , 
> it is possible for a user to provide a specially crafted SpEL expression that 
> may cause a denial-of-service (DoS) condition.
> ````
> By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
> After upgrading atlas to 2.4.0, here is the dependency tree, which uses 
> *atlas* to *5.3.39*
> {code:java}
> [INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
> [INFO] |  +- javax.inject:javax.inject:jar:1:compile
> [INFO] |  \- org.springframework:spring-context:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-aop:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-beans:jar:5.3.39:compile
> [INFO] |     +- org.springframework:spring-core:jar:5.3.39:compile
> [INFO] |     |  \- org.springframework:spring-jcl:jar:5.3.39:compile
> [INFO] |     \- org.springframework:spring-expression:jar:5.3.39:compile 
> {code}
>  
> Atlas spring framework used link is here - 
> [https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
> Upgrading to *Apache Atlas 2.4.0* will not only resolve the vulnerability but 
> also ensure alignment with {*}Apache Hive{*}, which uses {*}Spring Framework 
> 5.3.39{*}. This version of Spring Framework is included transitively by Hive.
> The same has suggested 
> [here|https://github.com/basapuram-kumar/hive/blob/b7a3e8b87d909edd7fc4f939ff87bbadddd61c06/pom.xml#L230C61-L230C124]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to