Skip to content

Commit 6ab0d67

Browse files
fix (spark-k8s): CVE-2024-36114 (#921)
* fix (spark-k8s): CVE-2024-36114 * Rename patch file name
1 parent 82fb887 commit 6ab0d67

File tree

2 files changed

+36
-0
lines changed

2 files changed

+36
-0
lines changed

CHANGELOG.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,8 @@ All notable changes to this project will be documented in this file.
6262
### Fixed
6363

6464
- hbase: link to phoenix server jar ([#811]).
65+
- spark: Fix CVE-2024-36114 in Spark 3.5.1 by upgrading a dependency.
66+
Spark 3.5.2 is not affected. ([#921])
6567
- trino: Correctly report Trino version ([#881]).
6668

6769
[#783]: https://github.com/stackabletech/docker-images/pull/783
@@ -106,6 +108,7 @@ All notable changes to this project will be documented in this file.
106108
[#914]: https://github.com/stackabletech/docker-images/pull/914
107109
[#917]: https://github.com/stackabletech/docker-images/pull/917
108110
[#920]: https://github.com/stackabletech/docker-images/pull/920
111+
[#921]: https://github.com/stackabletech/docker-images/pull/921
109112

110113
## [24.7.0] - 2024-07-24
111114

Lines changed: 33 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,33 @@
1+
Fix CVE-2024-36114
2+
see https://github.com/stackabletech/vulnerabilities/issues/834
3+
4+
Aircompressor is a library with ports of the Snappy, LZO, LZ4, and
5+
Zstandard compression algorithms to Java. All decompressor
6+
implementations of Aircompressor (LZ4, LZO, Snappy, Zstandard) can crash
7+
the JVM for certain input, and in some cases also leak the content of
8+
other memory of the Java process (which could contain sensitive
9+
information). When decompressing certain data, the decompressors try to
10+
access memory outside the bounds of the given byte arrays or byte
11+
buffers. Because Aircompressor uses the JDK class sun.misc.Unsafe to
12+
speed up memory access, no additional bounds checks are performed and
13+
this has similar security consequences as out-of-bounds access in C or
14+
C++, namely it can lead to non-deterministic behavior or crash the JVM.
15+
Users should update to Aircompressor 0.27 or newer where these issues
16+
have been fixed. When decompressing data from untrusted users, this can
17+
be exploited for a denial-of-service attack by crashing the JVM, or to
18+
leak other sensitive information from the Java process. There are no
19+
known workarounds for this issue.
20+
21+
diff --git a/pom.xml b/pom.xml
22+
index 6cca7db7bf8..fb9254e0cd9 100644
23+
--- a/pom.xml
24+
+++ b/pom.xml
25+
@@ -2558,7 +2558,7 @@
26+
<dependency>
27+
<groupId>io.airlift</groupId>
28+
<artifactId>aircompressor</artifactId>
29+
- <version>0.26</version>
30+
+ <version>0.27</version>
31+
</dependency>
32+
<dependency>
33+
<groupId>org.apache.orc</groupId>

0 commit comments

Comments
 (0)