[ 
https://issues.apache.org/jira/browse/HADOOP-19154?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17839168#comment-17839168
 ] 

ASF GitHub Bot commented on HADOOP-19154:
-----------------------------------------

pjfanning opened a new pull request, #6755:
URL: https://github.com/apache/hadoop/pull/6755

   ### Description of PR
   
   HADOOP-19154
   
   Release 1.78 deals with the following CVEs:
   
   CVE-2024-29857 - Importing an EC certificate with specially crafted F2m 
parameters can cause high CPU usage during parameter evaluation.
   CVE-2024-30171 - Possible timing based leakage in RSA based handshakes due 
to exception processing eliminated.
   CVE-2024-30172 - Crafted signature and public key can be used to trigger an 
infinite loop in the Ed25519 verification code.
   CVE-2024-301XX - When endpoint identification is enabled and an SSL socket 
is not created with an explicit hostname (as happens with HttpsURLConnection), 
hostname verification could be performed against a DNS-resolved IP address. 
This has been fixed.
   
   ### How was this patch tested?
   
   
   ### For code changes:
   
   - [x] Does the title or this PR starts with the corresponding JIRA issue id 
(e.g. 'HADOOP-17799. Your PR title ...')?
   - [ ] Object storage: have the integration tests been executed and the 
endpoint declared according to the connector-specific documentation?
   - [ ] If adding new dependencies to the code, are these dependencies 
licensed in a way that is compatible for inclusion under [ASF 
2.0](http://www.apache.org/legal/resolved.html#category-a)?
   - [x] If applicable, have you updated the `LICENSE`, `LICENSE-binary`, 
`NOTICE-binary` files?
   
   




> upgrade bouncy castle to 1.78.1 due to CVEs
> -------------------------------------------
>
>                 Key: HADOOP-19154
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19154
>             Project: Hadoop Common
>          Issue Type: Improvement
>          Components: common
>    Affects Versions: 3.4.0, 3.3.6
>            Reporter: PJ Fanning
>            Priority: Major
>
> [https://www.bouncycastle.org/releasenotes.html#r1rv78]
> There is a v1.78.1 release but no notes for it yet.
> For v1.78
> h3. 2.1.5 Security Advisories.
> Release 1.78 deals with the following CVEs:
>  * CVE-2024-29857 - Importing an EC certificate with specially crafted F2m 
> parameters can cause high CPU usage during parameter evaluation.
>  * CVE-2024-30171 - Possible timing based leakage in RSA based handshakes due 
> to exception processing eliminated.
>  * CVE-2024-30172 - Crafted signature and public key can be used to trigger 
> an infinite loop in the Ed25519 verification code.
>  * CVE-2024-301XX - When endpoint identification is enabled and an SSL socket 
> is not created with an explicit hostname (as happens with 
> HttpsURLConnection), hostname verification could be performed against a 
> DNS-resolved IP address. This has been fixed.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org

Reply via email to