[
https://issues.apache.org/jira/browse/HADOOP-19788?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18052704#comment-18052704
]
ASF GitHub Bot commented on HADOOP-19788:
-----------------------------------------
edwardcapriolo commented on PR #8188:
URL: https://github.com/apache/hadoop/pull/8188#issuecomment-3765440232
> @edwardcapriolo you need to also update the LICENSE-binary file - you NAed
that requirement in your description but this is exactly the kind of change
where it is applicable
>
> [CVE-2025-67735](https://github.com/advisories/GHSA-84h7-rjj3-6jx4) is the
CVE for reference
Thank you. I will update the PR. Please note I always check the box "allow
maintainers to edit my PR". In the interest of time please feel free to change
127 to 129 etc. or correct any other spelling mistake I have made.
> Netty needs to be updated
> -------------------------
>
> Key: HADOOP-19788
> URL: https://issues.apache.org/jira/browse/HADOOP-19788
> Project: Hadoop Common
> Issue Type: Improvement
> Reporter: Edward Capriolo
> Assignee: Edward Capriolo
> Priority: Major
> Labels: pull-request-available
>
> {code:java}
> //$ find . -name "*.java" | xargs grep HttpRequestEncoder
> ./hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/datanode/web/SimpleHttpProxyHandler.java:import
> io.netty.handler.codec.http.HttpRequestEncoder;
> ./hadoop-hdfs-project/hadoop-hdfs/src/main/java/org/apache/hadoop/hdfs/server/datanode/web/SimpleHttpProxyHandler.java:
> p.addLast(new HttpRequestEncoder());
> {code}
> [https://nvd.nist.gov/vuln/detail/CVE-2025-67735]
> h3. Description
> Netty is an asynchronous, event-driven network application framework. In
> versions prior to 4.1.129.Final and 4.2.8.Final, the
> `io.netty.handler.codec.http.HttpRequestEncoder` has a CRLF injection with
> the request URI when constructing a request. This leads to request smuggling
> when `HttpRequestEncoder` is used without proper sanitization of the URI. Any
> application / framework using `HttpRequestEncoder` can be subject to be
> abused to perform request smuggling using CRLF injection. Versions
> 4.1.129.Final and 4.2.8.Final fix the issue.
> Netty is constantly getting updated. This seems like a legit reason as any.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]