[ 
https://issues.apache.org/jira/browse/SPARK-53567?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dongjoon Hyun updated SPARK-53567:
----------------------------------
    Parent Issue: SPARK-54012  (was: SPARK-51166)

> Upgrade Netty to 4.1.125.Final
> ------------------------------
>
>                 Key: SPARK-53567
>                 URL: https://issues.apache.org/jira/browse/SPARK-53567
>             Project: Spark
>          Issue Type: Sub-task
>          Components: Build
>    Affects Versions: 3.5.6, 4.0.0
>            Reporter: Jota Martos
>            Assignee: Bjørn Jørgensen
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 4.1.0
>
>
> Upgrade Netty to 4.1.125.Final in order to fix CVE-2025-58056 and 
> CVE-2025-58057.
> https://github.com/netty/netty/security/advisories/GHSA-fghv-69vj-qj49
> A flaw in netty's parsing of chunk extensions in HTTP/1.1 messages with 
> chunked encoding can lead to request smuggling issues with some reverse 
> proxies.
> https://github.com/netty/netty/security/advisories/GHSA-3p8m-j85q-pgmj
> With specially crafted input, BrotliDecoder and some other decompressing 
> decoders will allocate a large number of reachable byte buffers, which can 
> lead to denial of service.
>  
>  



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to