anjoy8 opened a new issue, #36007:
URL: https://github.com/apache/doris/issues/36007

   ### Search before asking
   
   - [X] I had searched in the 
[issues](https://github.com/apache/doris/issues?q=is%3Aissue) and found no 
similar issues.
   
   
   ### Version
   
   3.1.11
   
   ### What's Wrong?
   
   When using the latest version of Doris, a vulnerability related to MySQL was 
detected by a security scanning company.
   The info is:
   Due to MySQL import, usage, or other associations with the subject of this 
CVE, it is affected. curl is a tool used for transferring data to or from a 
server. Versions 7.69.0 to 8.3.0 of curl contain a security vulnerability, 
stemming from a stack overflow vulnerability in SOCKS5.
   
   原文是:
   因mysql导入、使用或以其他方式与该CVE主体存在关联,因此受到影响。curl是一款用于从服务器传输数据或向服务器传输数据的工具。curl 
7.69.0至8.3.0版本存在安全漏洞,该漏洞源于SOCKS5存在堆栈溢出漏洞。
   
   
   
   ### What You Expected?
   
   Is there any way to solve this problem? Or is it not a vulnerability?
   
   ### How to Reproduce?
   
   This situation occurs in all versions.
   
   ### Anything Else?
   
   _No response_
   
   ### Are you willing to submit PR?
   
   - [X] Yes I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [X] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: commits-unsubscr...@doris.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: commits-unsubscr...@doris.apache.org
For additional commands, e-mail: commits-h...@doris.apache.org

Reply via email to