[ 
https://issues.apache.org/jira/browse/ZOOKEEPER-2423?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=15272637#comment-15272637
 ] 

Hadoop QA commented on ZOOKEEPER-2423:
--------------------------------------

-1 overall.  Here are the results of testing the latest attachment 
  http://issues.apache.org/jira/secure/attachment/12802454/ZOOKEEPER-2423.patch
  against trunk revision 1742171.

    +1 @author.  The patch does not contain any @author tags.

    -1 tests included.  The patch doesn't appear to include any new or modified 
tests.
                        Please justify why no new tests are needed for this 
patch.
                        Also please list what manual steps were performed to 
verify this patch.

    +1 javadoc.  The javadoc tool did not generate any warning messages.

    +1 javac.  The applied patch does not increase the total number of javac 
compiler warnings.

    +1 findbugs.  The patch does not introduce any new Findbugs (version 2.0.3) 
warnings.

    +1 release audit.  The applied patch does not increase the total number of 
release audit warnings.

    -1 core tests.  The patch failed core unit tests.

    +1 contrib tests.  The patch passed contrib unit tests.

Test results: 
https://builds.apache.org/job/PreCommit-ZOOKEEPER-Build/3157//testReport/
Findbugs warnings: 
https://builds.apache.org/job/PreCommit-ZOOKEEPER-Build/3157//artifact/trunk/build/test/findbugs/newPatchFindbugsWarnings.html
Console output: 
https://builds.apache.org/job/PreCommit-ZOOKEEPER-Build/3157//console

This message is automatically generated.

> Upgrade Netty version due to security vulnerability (CVE-2014-3488)
> -------------------------------------------------------------------
>
>                 Key: ZOOKEEPER-2423
>                 URL: https://issues.apache.org/jira/browse/ZOOKEEPER-2423
>             Project: ZooKeeper
>          Issue Type: Bug
>          Components: security, server
>    Affects Versions: 3.4.8, 3.5.1, 3.6.0
>            Reporter: Michael Han
>            Assignee: Michael Han
>            Priority: Critical
>              Labels: security
>             Fix For: 3.4.9, 3.5.2, 3.6.0
>
>         Attachments: ZOOKEEPER-2423.patch
>
>
> The SslHandler in Netty before 3.9.2 allows remote attackers to cause a 
> denial of service (infinite loop and CPU consumption) via a crafted 
> SSLv2Hello message [1]. We are using netty 3.7.x in ZK for 3.4/3.5/3.6, which 
> is affected by this vulnerability.
> We should upgrade Netty version to a later version that fixed this issue. I 
> am leaning towards to upgrade Netty version to 3.10.5 [2], which is the 
> latest release of the major version (3) that ZK 3.4/5/6 is using. Thoughts on 
> which Netty version we should upgrade to?
> [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=2014-3488
> [2] http://netty.io/news/



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

Reply via email to