Uploaded image for project: 'Apache Tez'
  1. Apache Tez
  2. TEZ-4353

Update commons-io to 2.8.0

    XMLWordPrintableJSON

Details

    • Improvement
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • 0.10.0
    • 0.10.2
    • None
    • None

    Description

      https://nvd.nist.gov/vuln/detail/CVE-2021-29425

      In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

      It is better to upgrade from 2.4 to 2.7 to fix the vulnerability.

       

      As we are planning to be in sync with the hadoop dependencies version, it is better to upgrade to 2.8.0 as support to hadoop-3.3 is in progress(TEZ-4311)

      Attachments

        1. TEZ-4353.001.patch
          0.4 kB
          D M Murali Krishna Reddy

        Activity

          People

            dmmkr D M Murali Krishna Reddy
            dmmkr D M Murali Krishna Reddy
            Votes:
            0 Vote for this issue
            Watchers:
            4 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved:

              Time Tracking

                Estimated:
                Original Estimate - Not Specified
                Not Specified
                Remaining:
                Remaining Estimate - 0h
                0h
                Logged:
                Time Spent - 50m
                50m