Tony Liu created PARQUET-2058:
---------------------------------

             Summary: Parquet-tools is affected by multiple CVEs
                 Key: PARQUET-2058
                 URL: https://issues.apache.org/jira/browse/PARQUET-2058
             Project: Parquet
          Issue Type: Bug
          Components: parquet-format
    Affects Versions: 1.11.1, 1.10.1, 1.10.0
            Reporter: Tony Liu


The parquet-tools library is affected by multiple CVEs.

 
|CVE-2018-10237|https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10237|Unbounded
 memory allocation in Google Guava 11.0 through 24.x before 24.1.1 allows 
remote attackers to conduct denial of service attacks against servers that 
depend on this library and deserialize attacker-provided data, because the 
AtomicDoubleArray class (when serialized with Java serialization) and the 
CompoundOrdering class (when serialized with GWT serialization) perform eager 
allocation without appropriate checks on what a client has sent and whether the 
data size is reasonable.|
|CVE-2020-8908|https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-8908|A 
temp directory creation vulnerability exists in all versions of Guava, allowing 
an attacker with access to the machine to potentially access data in a 
temporary directory created by the Guava API 
com.google.common.io.Files.createTempDir(). By default, on unix-like systems, 
the created directory is world-readable (readable by an attacker with access to 
the system). The method in question has been marked @Deprecated in versions 
30.0 and later and should not be used. For Android developers, we recommend 
choosing a temporary directory API provided by Android, such as 
context.getCacheDir(). For other Java developers, we recommend migrating to the 
Java 7 API java.nio.file.Files.createTempDirectory() which explicitly 
configures permissions of 700, or configuring the Java runtime\'s 
java.io.tmpdir system property to point to a location whose permissions are 
appropriately configured.|
|CVE-2019-17571|https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-17571|Included
 in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of 
untrusted data which can be exploited to remotely execute arbitrary code when 
combined with a deserialization gadget when listening to untrusted network 
traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.|
|CVE-2020-9488|https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-9488|Improper
 validation of certificate with host mismatch in Apache Log4j SMTP appender. 
This could allow an SMTPS connection to be intercepted by a man-in-the-middle 
attack which could leak any log messages sent through that appender.|

 

 

Is it possible to upgrade the POM files to reference the latest version of 
log4j and guava library?

 

Thanks

Tony

 



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

Reply via email to