[ 
https://issues.apache.org/jira/browse/KUDU-3581?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17850432#comment-17850432
 ] 

ASF subversion and git services commented on KUDU-3581:
-------------------------------------------------------

Commit 500d3d19f15c9c9b0e273adda7ec637dbc45c5c6 in kudu's branch 
refs/heads/branch-1.17.x from Alexey Serbin
[ https://gitbox.apache.org/repos/asf?p=kudu.git;h=500d3d19f ]

KUDU-3581: upgrade Netty to 4.1.110.Final

Even if Kudu doesn't use anything from Netty at its server side and
is not affected by the HTTP/2 rapid reset issue, it makes sense to
upgrade the Netty package used by the Kudu Java client library
to include the fix for well-known CVE [1].  It would be enough to
upgrade up to 4.1.100.Final, but I took the liberty of upgrading
up to the latest available 4.1.110.Final version.

[1] https://www.cve.org/CVERecord?id=CVE-2023-44487

Change-Id: I6e2ad686374b06d7b8cb28a7a456c21977b95ea8
Reviewed-on: http://gerrit.cloudera.org:8080/21464
Tested-by: Alexey Serbin <ale...@apache.org>
Reviewed-by: Yingchun Lai <laiyingc...@apache.org>
(cherry picked from commit 8d5f82483665fd6229d08fdfe94c87b07f80f986)
Reviewed-on: http://gerrit.cloudera.org:8080/21465
Reviewed-by: Attila Bukor <abu...@apache.org>


> Netty CVE Rapid Reset
> ---------------------
>
>                 Key: KUDU-3581
>                 URL: https://issues.apache.org/jira/browse/KUDU-3581
>             Project: Kudu
>          Issue Type: Task
>            Reporter: Colm O hEigeartaigh
>            Priority: Minor
>
> The version of Netty in Kudu 1.17.0 (4.1.94.Final - 
> [https://github.com/apache/kudu/blob/6d6364d19d287d8effb604b6ab11dfdff5db794e/java/gradle/dependencies.gradle#L52)]
>  is vulnerable to a security issue:
> [https://github.com/advisories/GHSA-xpw8-rcwv-8f8p]
> Please upgrade to at least 4.1.100.Final



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to