[
https://issues.apache.org/jira/browse/SPARK-53567?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18019845#comment-18019845
]
Jota Martos commented on SPARK-53567:
-------------------------------------
sorry for the noise, didn't see you already worked on this.
https://github.com/apache/spark/pull/52239
You can close the ticket now.
> Upgrade Netty to 4.1.125.Final
> ------------------------------
>
> Key: SPARK-53567
> URL: https://issues.apache.org/jira/browse/SPARK-53567
> Project: Spark
> Issue Type: Sub-task
> Components: Build
> Affects Versions: 3.5.6, 4.0.0
> Reporter: Jota Martos
> Assignee: Bjørn Jørgensen
> Priority: Major
> Labels: pull-request-available
> Fix For: 4.1.0
>
>
> Upgrade Netty to 4.1.125.Final in order to fix CVE-2025-58056 and
> CVE-2025-58057.
> https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
> A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with
> chunked encoding can lead to request smuggling issues with some reverse
> proxies.
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
> With specially crafted input, BrotliDecoder and some other decompressing
> decoders will allocate a large number of reachable byte buffers, which can
> lead to denial of service.
>
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]