You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@tez.apache.org by "D M Murali Krishna Reddy (Jira)" <ji...@apache.org> on 2021/11/21 17:17:00 UTC

[jira] [Updated] (TEZ-4353) Update commons-io to 2.8.0

     [ https://issues.apache.org/jira/browse/TEZ-4353?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

D M Murali Krishna Reddy updated TEZ-4353:
------------------------------------------
    Description: 
[https://nvd.nist.gov/vuln/detail/CVE-2021-29425]

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

It is better to upgrade from 2.4 to 2.7 to fix the vulnerability.

 

As we are planning to be in sync with the hadoop dependencies version, it is better to upgrade to 2.8.0 as support to hadoop-3.3 is in progress(TEZ-4311)

  was:
[https://nvd.nist.gov/vuln/detail/CVE-2021-29425]

In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.

It is better to upgrade from 2.4 to 2.7 to fix the vulnerability.

        Summary: Update commons-io to 2.8.0  (was: Update commons-io to 2.7)

> Update commons-io to 2.8.0
> --------------------------
>
>                 Key: TEZ-4353
>                 URL: https://issues.apache.org/jira/browse/TEZ-4353
>             Project: Apache Tez
>          Issue Type: Improvement
>    Affects Versions: 0.10.0
>            Reporter: D M Murali Krishna Reddy
>            Assignee: D M Murali Krishna Reddy
>            Priority: Major
>         Attachments: TEZ-4353.001.patch
>
>          Time Spent: 10m
>  Remaining Estimate: 0h
>
> [https://nvd.nist.gov/vuln/detail/CVE-2021-29425]
> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
> It is better to upgrade from 2.4 to 2.7 to fix the vulnerability.
>  
> As we are planning to be in sync with the hadoop dependencies version, it is better to upgrade to 2.8.0 as support to hadoop-3.3 is in progress(TEZ-4311)



--
This message was sent by Atlassian Jira
(v8.20.1#820001)