You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues-all@impala.apache.org by "Michael Smith (Jira)" <ji...@apache.org> on 2022/06/30 16:23:00 UTC

[jira] [Work started] (IMPALA-11407) Update google-oauth-client to address CVE-2021-22573

     [ https://issues.apache.org/jira/browse/IMPALA-11407?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Work on IMPALA-11407 started by Michael Smith.
----------------------------------------------
> Update google-oauth-client to address CVE-2021-22573
> ----------------------------------------------------
>
>                 Key: IMPALA-11407
>                 URL: https://issues.apache.org/jira/browse/IMPALA-11407
>             Project: IMPALA
>          Issue Type: Bug
>          Components: Frontend
>    Affects Versions: Impala 4.1.0
>            Reporter: Michael Smith
>            Assignee: Michael Smith
>            Priority: Major
>
> The vulnerability is that IDToken verifier does not verify if token is properly signed. Signature verification makes sure that the token's payload comes from valid provider, not from someone else. An attacker can provide a compromised token with custom payload. The token will pass the validation on the client side. We recommend upgrading to version 1.33.3 or above.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-all-unsubscribe@impala.apache.org
For additional commands, e-mail: issues-all-help@impala.apache.org