[
https://issues.apache.org/jira/browse/HADOOP-18933?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17779566#comment-17779566
]
ASF GitHub Bot commented on HADOOP-18933:
-----------------------------------------
pjfanning opened a new pull request, #6224:
URL: https://github.com/apache/hadoop/pull/6224
### Description of PR
Mitigates Netty security advisory GHSA-xpw8-rcwv-8f8p "HTTP/2 Rapid Reset
Attack - DDoS vector in the HTTP/2 protocol due RST frames"
Contributed by PJ Fanning
HADOOP-18933
HADOOP-18783
### How was this patch tested?
### For code changes:
- [x] Does the title or this PR starts with the corresponding JIRA issue id
(e.g. 'HADOOP-17799. Your PR title ...')?
- [ ] Object storage: have the integration tests been executed and the
endpoint declared according to the connector-specific documentation?
- [ ] If adding new dependencies to the code, are these dependencies
licensed in a way that is compatible for inclusion under [ASF
2.0](http://www.apache.org/legal/resolved.html#category-a)?
- [x] If applicable, have you updated the `LICENSE`, `LICENSE-binary`,
`NOTICE-binary` files?
> upgrade netty to 4.1.100 due to CVE
> -----------------------------------
>
> Key: HADOOP-18933
> URL: https://issues.apache.org/jira/browse/HADOOP-18933
> Project: Hadoop Common
> Issue Type: Improvement
> Components: build
> Reporter: PJ Fanning
> Assignee: PJ Fanning
> Priority: Major
> Labels: pull-request-available
> Fix For: 3.4.0
>
>
> follow up to https://issues.apache.org/jira/browse/HADOOP-18783
> https://netty.io/news/2023/10/10/4-1-100-Final.html
> security advisory
> https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
> "HTTP/2 Rapid Reset Attack - DDoS vector in the HTTP/2 protocol due RST
> framesHTTP/2 Rapid Reset Attack - DDoS vector in the HTTP/2 protocol due RST
> frames
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]