[
https://issues.apache.org/jira/browse/FLINK-36920?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17907339#comment-17907339
]
Robert Metzger commented on FLINK-36920:
----------------------------------------
merged to main / 1.11 in
https://github.com/apache/flink-kubernetes-operator/commit/5d301d139722e983daf55a11e9ee4469905838bc
[~gyfora] are you okay backporting this to the release-1.10 branch as well? It
is a minor version bump of a dependency in a (potential) bugfix release of the
K8s operator. I know the probability of a operator bugfix release is anyways
low, but if we roll one out, it would be good to get rid of this (potentially)
vulnerable dependency.
> Update org.quartz-schedule:quartz in flink-autoscaler module from 2.3.2 to
> 2.4.0
> --------------------------------------------------------------------------------
>
> Key: FLINK-36920
> URL: https://issues.apache.org/jira/browse/FLINK-36920
> Project: Flink
> Issue Type: Improvement
> Components: Kubernetes Operator
> Affects Versions: 1.10.0
> Reporter: Anupam Aggarwal
> Assignee: Anupam Aggarwal
> Priority: Minor
> Labels: pull-request-available
>
> Update dependency on org.quartz-scheduler:quartz used in flink-autoscaler
> module from 2.3.2 to 2.4.0
>
> *Vulnerability info:*
> cve-2023-39017
> quartz-jobs 2.3.2 and below was discovered to contain a code injection
> vulnerability in the component
> org.quartz.jobs.ee.jms.SendQueueMessageJob.execute. This vulnerability is
> exploited via passing an unchecked argument. NOTE: this is disputed by
> multiple parties because it is not plausible that untrusted user input would
> reach the code location where injection must occur.
> More details are at: [https://nvd.nist.gov/vuln/detail/cve-2023-39017]
> *Proposed fix*
> Bumping the dependency from 2.3.2 to 2.4.0
--
This message was sent by Atlassian Jira
(v8.20.10#820010)