Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[fix][sec] Upgrade Zookeeper to 3.8.3 to address CVE-2023-44981 #21398

Merged
merged 1 commit into from
Oct 19, 2023

Conversation

lhotari
Copy link
Member

@lhotari lhotari commented Oct 19, 2023

Motivation

OWASP dependency check reports CVE-2023-44981 for Zookeeper.

Modifications

Upgrade Zookeeper to 3.8.3.
Release notes: https://zookeeper.apache.org/doc/r3.8.3/releasenotes.html

Documentation

  • doc
  • doc-required
  • doc-not-needed
  • doc-complete

@codecov-commenter
Copy link

Codecov Report

Merging #21398 (38fd3bc) into master (b1bca56) will increase coverage by 0.05%.
Report is 5 commits behind head on master.
The diff coverage is 100.00%.

Impacted file tree graph

@@             Coverage Diff              @@
##             master   #21398      +/-   ##
============================================
+ Coverage     73.27%   73.32%   +0.05%     
+ Complexity    32581    32580       -1     
============================================
  Files          1888     1888              
  Lines        140282   140279       -3     
  Branches      15415    15416       +1     
============================================
+ Hits         102790   102861      +71     
+ Misses        29415    29338      -77     
- Partials       8077     8080       +3     
Flag Coverage Δ
inttests 24.19% <50.00%> (+0.03%) ⬆️
systests 24.77% <0.00%> (+0.06%) ⬆️
unittests 72.60% <100.00%> (+0.02%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Files Coverage Δ
...sar/broker/service/persistent/PersistentTopic.java 79.64% <100.00%> (+0.35%) ⬆️

... and 69 files with indirect coverage changes

@Technoboy- Technoboy- added this to the 3.2.0 milestone Oct 19, 2023
@lhotari lhotari merged commit e5120ec into apache:master Oct 19, 2023
47 of 48 checks passed
shibd pushed a commit to shibd/pulsar that referenced this pull request Oct 22, 2023
shibd pushed a commit to shibd/pulsar that referenced this pull request Oct 23, 2023
shibd pushed a commit to shibd/pulsar that referenced this pull request Oct 23, 2023
shibd pushed a commit to shibd/pulsar that referenced this pull request Oct 24, 2023
poorbarcode pushed a commit that referenced this pull request Oct 24, 2023
@compuguy
Copy link

Out of curiosity, because of the severity of CVE-2023-44981, will this cherry picked to fix the recent release of 3.1.1? Or will 3.1.2 be expedited?

lhotari added a commit that referenced this pull request Oct 26, 2023
@lhotari
Copy link
Member Author

lhotari commented Oct 26, 2023

Out of curiosity, because of the severity of CVE-2023-44981, will this cherry picked to fix the recent release of 3.1.1? Or will 3.1.2 be expedited?

@compuguy Unfortunately, this didn't make it to 3.1.1. . The release decisions are made on the dev mailing list. I have started this email thread: https://lists.apache.org/thread/czjtyxhfdbowptf34qs7r4o1qdpql5kh . I think it could justify expediting 3.1.2 release.

@compuguy
Copy link

I understand @lhotari. I honestly think that's a great justification for pushing that before 3.2. Plus fixing #21280, #21397, and #21395 would be beneficial. 👍

@Debashish-Mallick
Copy link

@lhotari Because of severity we cherry-picked to pulsar 2.10.4 , facing many issues during compile time Itself. Could you please suggest, whether It is applicable for 2.10.4 ? Seeing 2.10.6 labels is being added .

nikhil-ctds pushed a commit to datastax/pulsar that referenced this pull request Dec 20, 2023
srinath-ctds pushed a commit to datastax/pulsar that referenced this pull request Dec 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants