[ 
https://issues.apache.org/jira/browse/SPARK-39725?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17611248#comment-17611248
 ] 

phoebe chen commented on SPARK-39725:
-------------------------------------

[~bjornjorgensen] 

Thanks so much for your super fast response and detailed analysis.

For the jetty-io: 9.4.46 used by org.seleniumhq.selenium:htmlunit-driver, it 
seems to be in test scope.

As a spark-core:3.3.0 jar user, it seems that this jetty-io 9.4.46 used in 
htmlunit-driver won't bring impact.

The [PR37142|https://github.com/apache/spark/pull/37142] you made for this 
issue should upgrade all jetty jars (including jetty-io) to a 
vulnerability-free version and makes the spark-core.jar secure in terms of 
CVE-2022-2047 and CVE-2022-2048.

Now this issue is set with "Fixed Version" to 3.4.0 which will happen in 
February 2023, is it possible to include this 
[PR37142|https://github.com/apache/spark/pull/37142] in 3.3.1 release (or any 
release earlier than 3.4.0), so that the security fix can be applied earlier? 
Thanks.

 

> Upgrade jetty-http from 9.4.46.v20220331 to 9.4.48.v20220622
> ------------------------------------------------------------
>
>                 Key: SPARK-39725
>                 URL: https://issues.apache.org/jira/browse/SPARK-39725
>             Project: Spark
>          Issue Type: Bug
>          Components: Build
>    Affects Versions: 3.4.0
>            Reporter: Bjørn Jørgensen
>            Assignee: Bjørn Jørgensen
>            Priority: Major
>             Fix For: 3.4.0
>
>         Attachments: jetty-io-spark.png
>
>
> [Release note |https://github.com/eclipse/jetty.project/releases] 
> [CVE-2022-2047|https://nvd.nist.gov/vuln/detail/CVE-2022-2047]



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org

Reply via email to