Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SPARK-41030][BUILD][3.2] Upgrade Apache Ivy to 2.5.1 #39371

Closed

Conversation

bjornjorgensen
Copy link
Contributor

@bjornjorgensen bjornjorgensen commented Jan 3, 2023

What changes were proposed in this pull request?

Upgrade Apache Ivy from 2.5.0 to 2.5.1
Release notes

Why are the changes needed?

CVE-2022-37865 This is a 9.1 CRITICAL
and
CVE-2022-37866

Does this PR introduce any user-facing change?

No.

How was this patch tested?

Pass GA

@github-actions github-actions bot added the BUILD label Jan 3, 2023
@bjornjorgensen
Copy link
Contributor Author

bjornjorgensen commented Jan 3, 2023

@kyle-ai2

I will ping Sean, Hyukjin and dongjoon-hyun when all the tests have passed.

@bjornjorgensen bjornjorgensen changed the title [SPARK-41030][BUILD][3.2] Upgrade Apache Ivy to 2.5.1 [SPARK-41030][BUILD][3.2] Upgrade Apache Ivy to 2.5.1 Jan 3, 2023
@bjornjorgensen
Copy link
Contributor Author

bjornjorgensen commented Jan 3, 2023

This is a backport of #38539

This one is for 3.3 19824cf

Copy link
Member

@dongjoon-hyun dongjoon-hyun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1, LGTM (Pending CIs).
Thank you, @bjornjorgensen .

Copy link
Member

@dongjoon-hyun dongjoon-hyun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I fixed the linter failure here.

Merged to branch-3.2.

dongjoon-hyun pushed a commit that referenced this pull request Jan 4, 2023
### What changes were proposed in this pull request?
Upgrade `Apache Ivy` from 2.5.0 to 2.5.1
[Release  notes](https://ant.apache.org/ivy/history/2.5.1/release-notes.html)

### Why are the changes needed?
[CVE-2022-37865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865) This is a [9.1 CRITICAL](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-37865&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&version=3.1&source=NIST)
and
[CVE-2022-37866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)
### Does this PR introduce _any_ user-facing change?
No.

### How was this patch tested?
Pass GA

Closes #39371 from bjornjorgensen/ivy.version_2.5.1.

Lead-authored-by: Bjørn Jørgensen <bjornjorgensen@gmail.com>
Co-authored-by: Bjørn <bjornjorgensen@gmail.com>
Signed-off-by: Dongjoon Hyun <dongjoon@apache.org>
@dongjoon-hyun
Copy link
Member

Thank you, @bjornjorgensen and @HyukjinKwon

@bjornjorgensen bjornjorgensen deleted the ivy.version_2.5.1 branch January 4, 2023 12:21
@kyle-ai2
Copy link

kyle-ai2 commented Jan 4, 2023

Thanks everyone. Will this be released in a new Spark 3.2.4 image?

@bjornjorgensen
Copy link
Contributor Author

@kyle-ai2 Yes, this PR is a part of the 3.2 branch now.

@dongjoon-hyun
Copy link
Member

BTW, v3.2.4 is expected on April 2023 as EOL release according to the release cadence.

@dongjoon-hyun
Copy link
Member

Before v3.2.4,

  • v3.3.2 will arrive on Feb/March timeframe
  • v3.4.0 feature freeze will start on January 16th and RC will start on February.

@dongjoon-hyun
Copy link
Member

Apache Spark community always recommends to use the latest one. In case of SPARK-41030, v3.3.2 is the fastest release with that.

sunchao pushed a commit to sunchao/spark that referenced this pull request Jun 2, 2023
### What changes were proposed in this pull request?
Upgrade `Apache Ivy` from 2.5.0 to 2.5.1
[Release  notes](https://ant.apache.org/ivy/history/2.5.1/release-notes.html)

### Why are the changes needed?
[CVE-2022-37865](https://nvd.nist.gov/vuln/detail/CVE-2022-37865) This is a [9.1 CRITICAL](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?name=CVE-2022-37865&vector=AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H&version=3.1&source=NIST)
and
[CVE-2022-37866](https://nvd.nist.gov/vuln/detail/CVE-2022-37866)
### Does this PR introduce _any_ user-facing change?
No.

### How was this patch tested?
Pass GA

Closes apache#39371 from bjornjorgensen/ivy.version_2.5.1.

Lead-authored-by: Bjørn Jørgensen <bjornjorgensen@gmail.com>
Co-authored-by: Bjørn <bjornjorgensen@gmail.com>
Signed-off-by: Dongjoon Hyun <dongjoon@apache.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants