Since we are planning a new thirdparty release, IMO we also put
https://issues.apache.org/jira/browse/HBASE-28279, which bumps to latest
jetty. Package jetty-http, that we bundle (
https://mvnrepository.com/artifact/org.eclipse.jetty/jetty-http/9.4.52.v20230823),
has a direct CVE
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-36478

Regards,
Nihal

On Fri, 5 Jan 2024, 02:43 Andrew Purtell, <apurt...@apache.org> wrote:

> Sounds good. I think we agree on everything.
>
> On Thu, Jan 4, 2024 at 12:37 PM Bryan Beaudreault <bbeaudrea...@apache.org
> >
> wrote:
>
> > To clarify, I was referring to "It’s weird to have netty dependency
> > versions diverging." Which I do agree with, but was explaining my
> > understanding of the rationale.
> >
> > Otherwise, I agree with everything else. I have the PR ready for updating
> > netty in hbase-thirdparty. I can also vote and do the bump of
> > hbase-thirdparty.version in hbase once the release is made.
> >
> > On Thu, Jan 4, 2024 at 3:15 PM Andrew Purtell <apurt...@apache.org>
> wrote:
> >
> > > We should not ship a netty with known CVEs in hbase-thirdparty.
> Likewise
> > > for the other components shipped in hbase-thirdparty. As with all
> things
> > > this is a guideline, not a rule, because each situation is different
> and
> > > people do not always share the same opinion.
> > >
> > > I am of the opinion that moderate to high scoring CVEs in a dependency
> --
> > > and it doesn't matter if direct, transitive, or shaded -- is going to
> be
> > a
> > > problem for many users or potential users simply if they exist in our
> > bill
> > > of materials. At my employer we need to juggle the "cleanliness" of our
> > > software bill of materials among priorities and I do not think we are
> > > exceptional in any way. We do it in a fork but I have been meaning to
> do
> > a
> > > pass over the public open source project's dependency set, if this
> would
> > > have some value for the project (which I believe there is).
> > >
> > > I can do a thirdparty release now if everyone else is busy.
> > >
> > > On Thu, Jan 4, 2024 at 10:50 AM Bryan Beaudreault <
> > bbeaudrea...@apache.org
> > > >
> > > wrote:
> > >
> > > > I think we explicitly don't want our hbase-thirdparty netty version
> to
> > be
> > > > locked to the one for transitive dependencies. That's sort of why we
> > have
> > > > it in thirdparty/shaded at all, right?
> > > >
> > > > I created https://issues.apache.org/jira/browse/HBASE-28291 to
> update
> > > > pom.xml in hbase-thirdparty. I will handle that. We will need to do
> an
> > > > hbase-thirdparty release, which I'm not sure I'll have time for given
> > I'm
> > > > already behind on the 2.6.0 release
> > > >
> > > > On Thu, Jan 4, 2024 at 11:58 AM Andrew Purtell <
> > andrew.purt...@gmail.com
> > > >
> > > > wrote:
> > > >
> > > > > We should do that bump to hbase-thirdparty and spin another release
> > to
> > > > > keep our house in order. It isn’t urgent but would be good to
> address
> > > > this
> > > > > in the normal release cadence. That has been about once per fiscal
> > > > quarter
> > > > > recently.  It’s weird to have netty dependency versions diverging.
> > > > >
> > > > > I will make a note as RM to look at hbase-thirdparty versions with
> > > > respect
> > > > > to the base POM and known security issues, using snyk probably, and
> > > > update
> > > > > it ahead of 2.5.8. As well as direct dependencies in the base POM.
> > > > > Unfortunately I can’t promise to do anything about transitive
> issues
> > > > > imported from something that impacts operational compatibility.
> Those
> > > > must
> > > > > be weighed case by case.
> > > > >
> > > > > > On Jan 4, 2024, at 8:31 AM, Bryan Beaudreault <
> > > bbeaudrea...@apache.org
> > > > >
> > > > > wrote:
> > > > > >
> > > > > > It looks like that CVE only affects io.netty:netty-codec-http2.
> > > Since
> > > > > our
> > > > > > hbase-shaded-netty depends on netty-all, that module is included.
> > > > > However,
> > > > > > I don't think we use anything from netty-codec-http2. So I don't
> > > think
> > > > > the
> > > > > > CVE is a risk for this usage, unless you are building an app
> using
> > > the
> > > > > > org.apache.hbase.thirdparty.io.netty classes. This would not be
> > > > advised.
> > > > > >
> > > > > > That said, we could try to bump hbase-thirdparty to 4.1.100+ and
> > > > include
> > > > > > that in the upcoming 2.6.0 or 2.5.8 when that happens. If the CVE
> > > were
> > > > > > critical we could rush out another minor release, but I don't
> think
> > > > it's
> > > > > > necessary here? I also wonder if we should update
> > hbase-shaded-netty
> > > to
> > > > > > only pull in the netty modules we actually use.
> > > > > >
> > > > > >> On Thu, Jan 4, 2024 at 11:14 AM Dan Huff
> > > <dan.h...@dremio.com.invalid
> > > > >
> > > > > >> wrote:
> > > > > >>
> > > > > >> Thanks Bryan. That does help explain things. I have been looking
> > at
> > > > > >>
> > > >
> https://github.com/netty/netty/security/advisories/GHSA-xpw8-rcwv-8f8p
> > > > > and
> > > > > >> have been trying to determine if hbase is vulnerable to this
> > attack
> > > > > vector
> > > > > >> or not. I got excited when I saw 4.1.100.Final in 2.5.7 but it
> > > sounds
> > > > > like
> > > > > >> that excitement was misplaced :)
> > > > > >>
> > > > > >> Dan
> > > > > >>
> > > > > >> On Tue, Jan 2, 2024 at 12:54 PM Bryan Beaudreault <
> > > > > bbeaudrea...@apache.org
> > > > > >>>
> > > > > >> wrote:
> > > > > >>
> > > > > >>> Hello,
> > > > > >>>
> > > > > >>> As the comment above the netty version change says, this only
> > > affects
> > > > > the
> > > > > >>> transitive netty dependencies from thirdparty dependencies like
> > > > > zookeeper
> > > > > >>> and hadoop. HBase's internal netty usage (i.e. for HBase's RPC
> > > > > protocol)
> > > > > >>> uses the shaded netty provided by hbase-thirdparty.
> > > > > >>>
> > > > > >>> While you're generally correct that in maven you'd expect a
> > version
> > > > > >> defined
> > > > > >>> in dependencyManagement to affect all transitive dependencies,
> > that
> > > > is
> > > > > >> not
> > > > > >>> the case for hbase-thirdparty due to the shading we do there.
> At
> > > the
> > > > > time
> > > > > >>> of building hbase-thirdparty, the defined netty version there
> is
> > > > pulled
> > > > > >> in
> > > > > >>> and relocated to org.apache.hbase.thirdparty.io.netty and
> > published
> > > > as
> > > > > a
> > > > > >>> new maven module named hbase-shaded-netty. As such, the
> > > > > >>> dependencyManagement has no effect on it.
> > > > > >>>
> > > > > >>> I hope this helps
> > > > > >>>
> > > > > >>> On Tue, Jan 2, 2024 at 2:40 PM Dan Huff
> > > <dan.h...@dremio.com.invalid
> > > > >
> > > > > >>> wrote:
> > > > > >>>
> > > > > >>>> Hello there Hbase Devs--
> > > > > >>>>
> > > > > >>>> I have been investigating taking an update to Hbase 2.5.7
> after
> > > the
> > > > > >>> release
> > > > > >>>> last week and have what I hope is a quick question about
> commit
> > > > > 7639345
> > > > > >>>> <
> > > > > >>>>
> > > > > >>>
> > > > > >>
> > > > >
> > > >
> > >
> >
> https://github.com/apache/hbase/commit/7639345a970636e7a9eb7adf6d84dadd6f3fccb9
> > > > > >>>>>
> > > > > >>>> in
> > > > > >>>> branch-2.5.
> > > > > >>>>
> > > > > >>>> Am I correct in believing that the direct inclusion of netty
> > > > > >>> 4.1.100.Final
> > > > > >>>> in Hbase's pom.xml will override the 4.1.97.Final version that
> > is
> > > > > >>>> specified in hbase-thirdparty
> > > > > >>>> <
> > > > > >>
> > > >
> https://github.com/apache/hbase-thirdparty/blob/rel/4.1.5/pom.xml#L137
> > > > > >>>> ?
> > > > > >>>> I
> > > > > >>>> see 4.1.100.Final listed on
> > > > > >>>> https://hbase.apache.org/dependency-management.html which to
> me
> > > > > >> suggests
> > > > > >>>> that I am understanding this correctly that issues flagged
> > against
> > > > > >>>> 4.1.97.Final can be ignored since Hbase will now just use
> > > > > >> 4.1.100.Final.
> > > > > >>>>
> > > > > >>>> Thanks so much for your time,
> > > > > >>>>
> > > > > >>>> Dan Huff
> > > > > >>>>
> > > > > >>>
> > > > > >>
> > > > >
> > > >
> > >
> > >
> > > --
> > > Best regards,
> > > Andrew
> > >
> > > Unrest, ignorance distilled, nihilistic imbeciles -
> > >     It's what we’ve earned
> > > Welcome, apocalypse, what’s taken you so long?
> > > Bring us the fitting end that we’ve been counting on
> > >    - A23, Welcome, Apocalypse
> > >
> >
>
>
> --
> Best regards,
> Andrew
>
> Unrest, ignorance distilled, nihilistic imbeciles -
>     It's what we’ve earned
> Welcome, apocalypse, what’s taken you so long?
> Bring us the fitting end that we’ve been counting on
>    - A23, Welcome, Apocalypse
>

Reply via email to