anjoy8 opened a new issue, #36007: URL: https://github.com/apache/doris/issues/36007
### Search before asking - [X] I had searched in the [issues](https://github.com/apache/doris/issues?q=is%3Aissue) and found no similar issues. ### Version 3.1.11 ### What's Wrong? When using the latest version of Doris, a vulnerability related to MySQL was detected by a security scanning company. The info is: Due to MySQL import, usage, or other associations with the subject of this CVE, it is affected. curl is a tool used for transferring data to or from a server. Versions 7.69.0 to 8.3.0 of curl contain a security vulnerability, stemming from a stack overflow vulnerability in SOCKS5. 原文是: 因mysql导入、使用或以其他方式与该CVE主体存在关联,因此受到影响。curl是一款用于从服务器传输数据或向服务器传输数据的工具。curl 7.69.0至8.3.0版本存在安全漏洞,该漏洞源于SOCKS5存在堆栈溢出漏洞。 ### What You Expected? Is there any way to solve this problem? Or is it not a vulnerability? ### How to Reproduce? This situation occurs in all versions. ### Anything Else? _No response_ ### Are you willing to submit PR? - [X] Yes I am willing to submit a PR! ### Code of Conduct - [X] I agree to follow this project's [Code of Conduct](https://www.apache.org/foundation/policies/conduct) -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: commits-unsubscr...@doris.apache.org.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org --------------------------------------------------------------------- To unsubscribe, e-mail: commits-unsubscr...@doris.apache.org For additional commands, e-mail: commits-h...@doris.apache.org