[ 
https://issues.apache.org/jira/browse/HADOOP-19788?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18052598#comment-18052598
 ] 

ASF GitHub Bot commented on HADOOP-19788:
-----------------------------------------

edwardcapriolo opened a new pull request, #8188:
URL: https://github.com/apache/hadoop/pull/8188

   ### Description of PR
   Netty high performance communication library, very active and very heavily 
used security researchers always find things in it. Datanode uses some classes 
mentioned specifically in a CVE.
   https://issues.apache.org/jira/browse/HADOOP-19788
   
   ### How was this patch tested?
   
   Running mvn test
   
   ### For code changes:
   
   - [ Y] Does the title or this PR starts with the corresponding JIRA issue id 
(e.g. 'HADOOP-17799. Your PR title ...')?
   - [ NA] Object storage: have the integration tests been executed and the 
endpoint declared according to the connector-specific documentation?
   - [ NA] If adding new dependencies to the code, are these dependencies 
licensed in a way that is compatible for inclusion under [ASF 
2.0](http://www.apache.org/legal/resolved.html#category-a)?
   - [ NA] If applicable, have you updated the `LICENSE`, `LICENSE-binary`, 
`NOTICE-binary` files?
   
   ### AI Tooling
   
   Na AI was used, I still code the way my grandfather did. 
   
   - [ NA] The PR includes the phrase "Contains content generated by <tool>"
         where <tool> is the name of the AI tool used.
   - [ NA] My use of AI contributions follows the ASF legal policy
         https://www.apache.org/legal/generative-tooling.html




> Netty needs to be updated
> -------------------------
>
>                 Key: HADOOP-19788
>                 URL: https://issues.apache.org/jira/browse/HADOOP-19788
>             Project: Hadoop Common
>          Issue Type: Improvement
>            Reporter: Edward Capriolo
>            Priority: Major
>
> {code:java}
> //$ find . -name "*.java" | xargs grep HttpRequestEncoder
> ./hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/datanode/web/SimpleHttpProxyHandler.java:import
>  io.netty.handler.codec.http.HttpRequestEncoder;
> ./hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/datanode/web/SimpleHttpProxyHandler.java:
>           p.addLast(new HttpRequestEncoder());
>  {code}
> [https://nvd.nist.gov/vuln/detail/CVE-2025-67735]
> h3. Description
> Netty is an asynchronous, event-driven network application framework. In 
> versions prior to 4.1.129.Final and 4.2.8.Final, the 
> `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with 
> the request URI when constructing a request. This leads to request smuggling 
> when `HttpRequestEncoder` is used without proper sanitization of the URI. Any 
> application / framework using `HttpRequestEncoder` can be subject to be 
> abused to perform request smuggling using CRLF injection. Versions 
> 4.1.129.Final and 4.2.8.Final fix the issue.
> Netty is constantly getting update, this seems like a legit reason as any.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to