-
Notifications
You must be signed in to change notification settings - Fork 29.1k
[SPARK-34988][CORE][3.1] Upgrade Jetty for CVE-2021-28165 #32095
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Kubernetes integration test starting |
|
Kubernetes integration test status failure |
srowen
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All the backports seem fine
|
Test build #137075 has finished for PR 32095 at commit
|
### What changes were proposed in this pull request? This PR backports #32091. This PR upgrades the version of Jetty to 9.4.39. ### Why are the changes needed? CVE-2021-28165 affects the version of Jetty that Spark uses and it seems to be a little bit serious. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28165 ### Does this PR introduce _any_ user-facing change? No. ### How was this patch tested? Existing tests. Closes #32095 from sarutak/SPARK-34988-branch-3.1. Authored-by: Kousuke Saruta <sarutak@oss.nttdata.com> Signed-off-by: Sean Owen <srowen@gmail.com>
|
Merged to 3.1 |
|
Thanks! |
|
Any idea when this fix will be released for the version 3.1.1? |
|
@jeffreysmooth . Do you mean Apache Spark 3.1.2 because 3.1.1 is already released? Apache Spark 3.1.2 vote will start soon but currently the community is busy for DATA+AI Summit (Previously Spark summit). |
|
Thanks for the quick response. What I meant is currently CVE-2021-28165 exist in 3.1.1 version so I asked when patched version will be released since I noticed fix already been merged into 3.1. I believe 3.1.2 include this fix. |
This PR backports apache#32091. This PR upgrades the version of Jetty to 9.4.39. CVE-2021-28165 affects the version of Jetty that Spark uses and it seems to be a little bit serious. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28165 No. Existing tests. Closes apache#32095 from sarutak/SPARK-34988-branch-3.1. Authored-by: Kousuke Saruta <sarutak@oss.nttdata.com> Signed-off-by: Sean Owen <srowen@gmail.com>
What changes were proposed in this pull request?
This PR backports #32091.
This PR upgrades the version of Jetty to 9.4.39.
Why are the changes needed?
CVE-2021-28165 affects the version of Jetty that Spark uses and it seems to be a little bit serious.
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28165
Does this PR introduce any user-facing change?
No.
How was this patch tested?
Existing tests.