- 
          
- 
                Notifications
    You must be signed in to change notification settings 
- Fork 6
fix(hive): CVE-2023-34455 #929
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
| Merged main and moved changelog entries up to the Unreleased section. | 
| Instead of relying on getting a newer dependency "by accident" we'd need to actually properly depend on the new version. | 
| 
 A newer version is already configured in the parent pom.xml. Here we exclude the vulnerable version that is coming with  | 
| But if we have a newer version in the parent we don't need to exclude it here, do we? | 
| 
 It's been a while so I had to start from the beginning. Currently, without this patch, the vulnerable snappy jar is indeed not part of the image (at list not as a stand-alone jar file). It is listed in the CycloneDX output, that's why the vulnerability is reported. Proof: This patch removes it from the CycloneDX file too. The confusion arises from the fact that the Cyclone report is generated from the original Hive pom.xml but we actually copy the Hadoop binaries that we build ourselves. Now I think that a better approach would be to classify the vulnerability as a false positive in SecObserve and close this PR. WDYT? | 
| Okay. Understood. In that case I'm fine with either option. I just wanted to understand. We can merge this PR (maybe with an extended comment on why we exclude it) or close it in SecObserve. Please continue as you see fit. | 
| 
 Sounds good to me. I also checked the image and did not find the affected Snappy version anywhere, I even checked whether it's included in any other "fat" JAR, which was not the case. The vulnerability should go away completely once we generate our own version of Hadoop and depend on that in Hive's pom.xml, which will hopefully happen soon-ish. | 
| The CVE has been assesst as "false positive". | 
Description
Part of: https://github.com/stackabletech/vulnerabilities/issues/862
Tests
🟢 CI: https://testing.stackable.tech/view/02%20Operator%20Tests%20(custom)/job/hive-operator-it-custom/5/
* the failed test worked locally
Trivy
CVE no longer found in image.
scan.json