[
https://issues.apache.org/jira/browse/HIVE-28693?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17910278#comment-17910278
]
Basapuram Kumar commented on HIVE-28693:
----------------------------------------
PR - [https://github.com/apache/hive/pull/5597]
> Bump Atlas to 2.4.0 to fix CVE's
> --------------------------------
>
> Key: HIVE-28693
> URL: https://issues.apache.org/jira/browse/HIVE-28693
> Project: Hive
> Issue Type: Improvement
> Reporter: Basapuram Kumar
> Assignee: Basapuram Kumar
> Priority: Major
> Labels: pull-request-available
>
> *Issue*
> The current version of Hive uses Apache Atlas 2.3.0, which transitively
> depends on Spring Framework-5.3.21. This specific version of the Spring
> Framework is vulnerable to CVE-2023-20863.
> *Root Cause:*
> The vulnerability exists due to the dependency on Apache Atlas 2.3.0, which
> includes the outdated and vulnerable version of the Spring Framework (5.3.21).
> *Resolution Suggestion:*
> To address CVE-2023-20863, it is recommended to upgrade Apache Atlas to
> version 2.4.0, which includes an updated and secure version of the Spring
> Framework-5.3.39.
>
> [CVE-2023-20863|https://nvd.nist.gov/vuln/detail/CVE-2023-20863] Description
> ```
> In spring framework versions prior to 5.2.24 release+ ,5.3.27+ and 6.0.8+ ,
> it is possible for a user to provide a specially crafted SpEL expression that
> may cause a denial-of-service (DoS) condition.
> ````
> By upgrading Atlas-2.4.0, it used *springframework-5.3.39*
> After upgrading atlas to 2.4.0, here is the dependency tree, which uses
> *atlas* to *5.3.39*
> {code:java}
> [INFO] +- org.apache.atlas:atlas-intg:jar:2.4.0:compile
> [INFO] | +- javax.inject:javax.inject:jar:1:compile
> [INFO] | \- org.springframework:spring-context:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-aop:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-beans:jar:5.3.39:compile
> [INFO] | +- org.springframework:spring-core:jar:5.3.39:compile
> [INFO] | | \- org.springframework:spring-jcl:jar:5.3.39:compile
> [INFO] | \- org.springframework:spring-expression:jar:5.3.39:compile
> {code}
>
> Atlas spring framework used link is here -
> [https://github.com/apache/atlas/blob/4787b753271718d0b06cf6545f331f9a12ce1f63/pom.xml#L179C1-L180C1]
> Upgrading to *Apache Atlas 2.4.0* will not only resolve the vulnerability but
> also ensure alignment with {*}Apache Hive{*}, which uses {*}Spring Framework
> 5.3.39{*}. This version of Spring Framework is included transitively by Hive.
> The same has suggested
> [here|https://github.com/basapuram-kumar/hive/blob/b7a3e8b87d909edd7fc4f939ff87bbadddd61c06/pom.xml#L230C61-L230C124]
--
This message was sent by Atlassian Jira
(v8.20.10#820010)