[
https://issues.apache.org/jira/browse/SPARK-53567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]
Dongjoon Hyun updated SPARK-53567:
----------------------------------
Parent Issue: SPARK-54012 (was: SPARK-51166)
> Upgrade Netty to 4.1.125.Final
> ------------------------------
>
> Key: SPARK-53567
> URL: https://issues.apache.org/jira/browse/SPARK-53567
> Project: Spark
> Issue Type: Sub-task
> Components: Build
> Affects Versions: 3.5.6, 4.0.0
> Reporter: Jota Martos
> Assignee: Bjørn Jørgensen
> Priority: Major
> Labels: pull-request-available
> Fix For: 4.1.0
>
>
> Upgrade Netty to 4.1.125.Final in order to fix CVE-2025-58056 and
> CVE-2025-58057.
> https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
> A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with
> chunked encoding can lead to request smuggling issues with some reverse
> proxies.
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
> With specially crafted input, BrotliDecoder and some other decompressing
> decoders will allocate a large number of reachable byte buffers, which can
> lead to denial of service.
>
>
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]