[
https://issues.apache.org/jira/browse/SPARK-53567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Jota Martos updated SPARK-53567:
--------------------------------
Description:
Upgrade Netty to 4.1.125.Final in order to fix CVE-2025-58056 and
CVE-2025-58057.
https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with chunked
encoding can lead to request smuggling issues with some reverse proxies.
https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
With specially crafted input, BrotliDecoder and some other decompressing
decoders will allocate a large number of reachable byte buffers, which can lead
to denial of service.
was:
Upgrade Netty to 4.1.124.Final in order to fix CVE-2025-55163.
Netty is an asynchronous, event-driven network application framework. Prior to
versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset
DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses
malformed HTTP/2 control frames in order to break the max concurrent streams
limit - which results in resource exhaustion and distributed denial of service.
This issue has been patched in versions 4.1.124.Final and 4.2.4.Final.
> Upgrade Netty to 4.1.125.Final
> ------------------------------
>
> Key: SPARK-53567
> URL: https://issues.apache.org/jira/browse/SPARK-53567
> Project: Spark
> Issue Type: Sub-task
> Components: Build
> Affects Versions: 3.5.6, 4.0.0
> Reporter: Jota Martos
> Assignee: Bjørn Jørgensen
> Priority: Major
> Labels: pull-request-available
> Fix For: 4.1.0
>
>
> Upgrade Netty to 4.1.125.Final in order to fix CVE-2025-58056 and
> CVE-2025-58057.
> https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
> A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with
> chunked encoding can lead to request smuggling issues with some reverse
> proxies.
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
> With specially crafted input, BrotliDecoder and some other decompressing
> decoders will allocate a large number of reachable byte buffers, which can
> lead to denial of service.
>
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]