-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
🔐 Update dependencies to fix vulnerabilities
- Loading branch information
Automatic Dependency Updater
committed
Sep 21, 2024
1 parent
d2cb5ec
commit 57b860e
Showing
6 changed files
with
129 additions
and
54 deletions.
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,74 @@ | ||
# Cloud Storage Extension 2.8.3, released 2024-??-?? | ||
|
||
Code name: Fixed vulnerability CVE-2024-7254 in com.google.protobuf:protobuf-java:jar:3.25.4:compile | ||
|
||
## Summary | ||
|
||
This release fixes the following vulnerability: | ||
|
||
### CVE-2024-7254 (CWE-20) in dependency `com.google.protobuf:protobuf-java:jar:3.25.4:compile` | ||
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker. | ||
#### References | ||
* https://ossindex.sonatype.org/vulnerability/CVE-2024-7254?component-type=maven&component-name=com.google.protobuf%2Fprotobuf-java&utm_source=ossindex-client&utm_medium=integration&utm_content=1.8.1 | ||
* http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-7254 | ||
* https://github.com/advisories/GHSA-735f-pc8j-v9w8 | ||
|
||
## Security | ||
|
||
* #324: Fixed vulnerability CVE-2024-7254 in dependency `com.google.protobuf:protobuf-java:jar:3.25.4:compile` | ||
|
||
## Dependency Updates | ||
|
||
### Cloud Storage Extension | ||
|
||
#### Compile Dependency Updates | ||
|
||
* Updated `com.github.mwiede:jsch:0.2.18` to `0.2.20` | ||
* Updated `com.google.cloud.bigdataoss:gcs-connector:1.9.4-hadoop3` to `3.0.2` | ||
* Updated `com.google.guava:guava:33.2.1-jre` to `33.3.0-jre` | ||
* Updated `com.google.protobuf:protobuf-java:3.25.4` to `4.28.2` | ||
* Updated `com.nimbusds:nimbus-jose-jwt:9.40` to `9.41.1` | ||
* Updated `io.airlift:aircompressor:0.27` to `2.0.2` | ||
* Updated `io.dropwizard.metrics:metrics-core:4.2.26` to `4.2.27` | ||
* Updated `io.grpc:grpc-netty:1.65.1` to `1.68.0` | ||
* Updated `io.netty:netty-codec-http2:4.1.112.Final` to `4.1.113.Final` | ||
* Updated `org.alluxio:alluxio-core-client-hdfs:300` to `313` | ||
* Updated `org.apache.avro:avro:1.11.3` to `1.12.0` | ||
* Updated `org.apache.commons:commons-compress:1.26.2` to `1.27.1` | ||
* Updated `org.apache.commons:commons-lang3:3.15.0` to `3.17.0` | ||
* Updated `org.apache.hadoop:hadoop-aws:3.3.6` to `3.4.0` | ||
* Updated `org.apache.hadoop:hadoop-azure-datalake:3.3.6` to `3.4.0` | ||
* Updated `org.apache.hadoop:hadoop-azure:3.3.6` to `3.4.0` | ||
* Updated `org.apache.hadoop:hadoop-common:3.3.6` to `3.4.0` | ||
* Updated `org.apache.hadoop:hadoop-hdfs-client:3.3.6` to `3.4.0` | ||
* Updated `org.apache.hadoop:hadoop-hdfs:3.3.6` to `3.4.0` | ||
* Updated `org.apache.logging.log4j:log4j-1.2-api:2.23.1` to `2.24.0` | ||
* Updated `org.apache.logging.log4j:log4j-api:2.23.1` to `2.24.0` | ||
* Updated `org.apache.logging.log4j:log4j-core:2.23.1` to `2.24.0` | ||
* Updated `org.apache.orc:orc-core:1.9.4` to `2.0.2` | ||
* Updated `org.apache.spark:spark-sql_2.13:3.4.1` to `4.0.0-preview2` | ||
* Updated `org.glassfish.jersey.containers:jersey-container-servlet-core:2.43` to `3.1.8` | ||
* Updated `org.glassfish.jersey.containers:jersey-container-servlet:2.43` to `3.1.8` | ||
* Updated `org.glassfish.jersey.core:jersey-client:2.43` to `3.1.8` | ||
* Updated `org.glassfish.jersey.core:jersey-common:2.43` to `3.1.8` | ||
* Updated `org.glassfish.jersey.core:jersey-server:2.43` to `3.1.8` | ||
* Updated `org.glassfish.jersey.inject:jersey-hk2:2.43` to `3.1.8` | ||
* Updated `org.jetbrains.kotlin:kotlin-stdlib:1.9.25` to `2.0.20` | ||
* Updated `org.scala-lang:scala-library:2.13.11` to `2.13.15` | ||
* Updated `org.slf4j:jul-to-slf4j:2.0.13` to `2.0.16` | ||
* Updated `org.xerial.snappy:snappy-java:1.1.10.5` to `1.1.10.7` | ||
|
||
#### Runtime Dependency Updates | ||
|
||
* Updated `ch.qos.logback:logback-classic:1.5.6` to `1.5.8` | ||
* Updated `ch.qos.logback:logback-core:1.5.6` to `1.5.8` | ||
|
||
#### Test Dependency Updates | ||
|
||
* Updated `com.exasol:exasol-testcontainers:7.1.0` to `7.1.1` | ||
* Updated `com.exasol:hamcrest-resultset-matcher:1.6.5` to `1.7.0` | ||
* Updated `nl.jqno.equalsverifier:equalsverifier:3.16.1` to `3.16.2` | ||
* Updated `org.hamcrest:hamcrest:2.2` to `3.0` | ||
* Updated `org.junit.jupiter:junit-jupiter-engine:5.10.3` to `5.11.0` | ||
* Updated `org.mockito:mockito-core:5.12.0` to `5.13.0` | ||
* Updated `org.testcontainers:localstack:1.20.0` to `1.20.1` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
Oops, something went wrong.