There appears to be consensus to bring this critical fix to support/1.12

https://github.com/apache/geode/pull/4926 
<https://github.com/apache/geode/pull/4926> has been merged to support/1.12 and 
Jira updated with correct fix versions.


> On Apr 8, 2020, at 1:41 PM, Dick Cavender <dcaven...@pivotal.io> wrote:
> 
> +1
> 
> On Wed, Apr 8, 2020 at 10:08 AM Joris Melchior <jmelch...@pivotal.io> wrote:
> 
>> +1
>> 
>> On Wed, Apr 8, 2020 at 12:21 PM Owen Nichols <onich...@pivotal.io> wrote:
>> 
>>> Recently it’s been noticed that netty-all-4.1.42.Final.jar is getting
>>> flagged for “high" security vulnerability CVE-2019-20444 and
>> CVE-2019-20445.
>>> 
>>> Analysis shows that Geode does not use Netty in a manner that would
>> expose
>>> this vulnerability.
>>> 
>>> The risk of bringing GEODE-7969 is very low.  Netty is only imported for
>>> some I/O libraries in geode-redis, not used as a server.  GEODE-7969 has
>>> passed all PR checks on support/1.12, and the same version bump to
>>> 4.1.45.Final has been on develop since February via GEODE-7798.
>>> 
>>> This fix is critical to avoid false positives in automated vulnerability
>>> scans.
>>> 
>>> -Owen
>> 
>> 
>> 
>> --
>> *Joris Melchior *
>> CF Engineering
>> Pivotal Toronto
>> 416 877 5427
>> 
>> “Programs must be written for people to read, and only incidentally for
>> machines to execute.” – *Hal Abelson*
>> <https://en.wikipedia.org/wiki/Hal_Abelson>
>> 

Reply via email to