Skip to content

Update zookeeper version to fix CVEs#24403

Merged
aaneja merged 1 commit intoprestodb:masterfrom
bibith4:zookeeper_update_v1.1.6
May 7, 2025
Merged

Update zookeeper version to fix CVEs#24403
aaneja merged 1 commit intoprestodb:masterfrom
bibith4:zookeeper_update_v1.1.6

Conversation

@bibith4
Copy link
Contributor

@bibith4 bibith4 commented Jan 21, 2025

Description

Changes to upgrade zookeeper versions to 3.9.3 to remove vulnerabilities

Motivation and Context

The presto-accumulo, presto-delta,presto-hive,presto-kafka and presto-hudi have interdependencies with zookeeper version 3.4.14, which contain vulnerabilities. These vulnerabilities can be removed by upgrading the zookeeper dependency to 3.9.3

Impact

Test Plan

Contributor checklist

  • Please make sure your submission complies with our contributing guide, in particular code style and commit standards.
  • PR description addresses the issue accurately and concisely. If the change is non-trivial, a GitHub Issue is referenced.
  • Documented new properties (with its default value), SQL syntax, functions, or other functionality.
  • If release notes are required, they follow the release notes guidelines.
  • Adequate tests were added if applicable.
  • CI passed.

Release Notes

Please follow release notes guidelines and fill in the release notes below.

== RELEASE NOTES ==

Security Changes
* Upgrade zookeeper to 3.9.3 to fix security vulnerability in presto-accumulo, presto-delta,presto-hive,presto-kafka and presto-hudi  in response to `CVE-2023-44981 <https://nvd.nist.gov/vuln/detail/cve-2023-44981>`_.

@prestodb-ci prestodb-ci added the from:IBM PR from IBM label Jan 21, 2025
@prestodb-ci prestodb-ci requested review from a team, BryanCutler and aaneja and removed request for a team January 21, 2025 09:50
@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch 2 times, most recently from b819bf6 to dc1cc7b Compare January 21, 2025 09:59
BryanCutler
BryanCutler previously approved these changes Jan 22, 2025
Copy link
Contributor

@BryanCutler BryanCutler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM pending tests

<groupId>org.apache.zookeeper</groupId>
<artifactId>zookeeper</artifactId>
<version>3.4.14</version>
<version>3.9.3</version>
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

JFYI - We do have an upgrade to Kafka dependencies as a WIP too -#24382
It should not impact this PR (tests seem to pass) cc : @ZacBlanco

Copy link
Contributor Author

@bibith4 bibith4 Jan 29, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@aaneja The test case failures in this PR will be resolved once the Kafka upgrade PR is merged. The failures occur because the ZooKeeper client used in our Kafka connector doesn’t support newer versions of ZooKeeper. However, since newer versions of Kafka have fully removed support for ZooKeeper, these failures will disappear after the Kafka upgrade
cc : @ZacBlanco @imjalpreet

@bibith4 bibith4 changed the title Update zookeeper version to fix common vulnerabilities and exposures Update zookeeper version to fix common vulnerabilities and exposures(Do not review) Jan 22, 2025
@steveburnett
Copy link
Contributor

Thanks for the release note! Suggest adding a little description of the work done in the PR ("Upgrade zookeeper to 3.9.3") that results in fixing the security vulnerabilities.

== RELEASE NOTES ==

Security Changes
* Upgrade zookeeper to 3.9.3 to fix security vulnerability in presto-accumulo, presto-delta,presto-hive,presto-kafka and presto-hudi  in response to `CVE-2023-44981 <https://nvd.nist.gov/vuln/detail/cve-2023-44981>`_. :pr:`24403`

@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch from c11877c to ab4f9e5 Compare January 28, 2025 06:13
@bibith4
Copy link
Contributor Author

bibith4 commented Jan 29, 2025

Thanks for the release note! Suggest adding a little description of the work done in the PR ("Upgrade zookeeper to 3.9.3") that results in fixing the security vulnerabilities.

== RELEASE NOTES ==

Security Changes
* Upgrade zookeeper to 3.9.3 to fix security vulnerability in presto-accumulo, presto-delta,presto-hive,presto-kafka and presto-hudi  in response to `CVE-2023-44981 <https://nvd.nist.gov/vuln/detail/cve-2023-44981>`_. :pr:`24403`

@steveburnett Corrected. Please check

@bibith4 bibith4 changed the title Update zookeeper version to fix common vulnerabilities and exposures(Do not review) Update zookeeper version to fix common vulnerabilities and exposures(Do not merge) Jan 29, 2025
@bibith4 bibith4 marked this pull request as ready for review January 29, 2025 05:30
@bibith4 bibith4 requested a review from a team as a code owner January 29, 2025 05:30
Copy link
Contributor

@aaneja aaneja left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please edit your commit message as per our guidelines https://github.com/prestodb/presto/wiki/Review-and-Commit-guidelines#example-commit-message. You can add the CVE id this addresses to the commit message

@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch 2 times, most recently from d72ddd1 to 78f9857 Compare January 31, 2025 10:00
@bibith4
Copy link
Contributor Author

bibith4 commented Jan 31, 2025

Please edit your commit message as per our guidelines https://github.com/prestodb/presto/wiki/Review-and-Commit-guidelines#example-commit-message. You can add the CVE id this addresses to the commit message

@aaneja modified the commit message by adding CVE id

@bibith4 bibith4 requested a review from aaneja January 31, 2025 11:04
aaneja
aaneja previously approved these changes Jan 31, 2025
Copy link
Contributor

@BryanCutler BryanCutler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Couple of small issues

@steveburnett
Copy link
Contributor

New release note guidelines as of last week: PR #24354 automatically adds links to this PR to the release notes. Please remove the manual PR link in the following format from the release note entries for this PR.

:pr:`12345`

I have updated the Release Notes Guidelines to remove the examples of manually adding the PR link.

@bibith4
Copy link
Contributor Author

bibith4 commented Feb 4, 2025

New release note guidelines as of last week: PR #24354 automatically adds links to this PR to the release notes. Please remove the manual PR link in the following format from the release note entries for this PR.

:pr:`12345`

I have updated the Release Notes Guidelines to remove the examples of manually adding the PR link.

@steveburnett Corrected . Please check

@steveburnett
Copy link
Contributor

@steveburnett Corrected . Please check

Looks good, thanks!

@bibith4 bibith4 requested a review from aaneja February 5, 2025 06:03
BryanCutler
BryanCutler previously approved these changes Feb 6, 2025
Copy link
Contributor

@BryanCutler BryanCutler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, pending tests

aaneja
aaneja previously approved these changes Feb 7, 2025
@ethanyzhang
Copy link
Contributor

Hi @bibith4, what's the plan for this PR?

@bibith4 bibith4 dismissed stale reviews from aaneja and BryanCutler via 0c25890 May 2, 2025 10:22
import java.time.Duration;

import static java.lang.String.format;
public class TestingAccumuloServer
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you explain why we're going this route vs updating the MiniAccumuloCluster? This seems like a lot of change just to support zookeeper. Is there an advantage to using this over mini accumulo cluster?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@ZacBlanco We tried to address the vulnerability by upgrading the ZooKeeper version to 3.9.3. However, after the upgrade, the Accumulo test cases were failing because the ZooKeeper instance couldn't start. During our investigation, we found this pull request from Trino:
trinodb/trino#5598,
which uses Accumulo in Docker for unit testing. With this changes we tried running the tests using the presto-accumulo JAR, and they completed successfully.

@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch from 0c25890 to 957d25c Compare May 3, 2025 07:38
@bibith4 bibith4 requested a review from a team as a code owner May 5, 2025 06:53
@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch from 9989846 to aae0886 Compare May 5, 2025 07:06
@bibith4 bibith4 requested review from ZacBlanco and aaneja May 5, 2025 09:56
@ethanyzhang ethanyzhang changed the title Update zookeeper version to fix common vulnerabilities and exposures(Do not merge) Update zookeeper version to fix common vulnerabilities and exposures May 5, 2025
@ZacBlanco ZacBlanco changed the title Update zookeeper version to fix common vulnerabilities and exposures Update zookeeper version to fix CVEs May 6, 2025
@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch from aae0886 to e844c9b Compare May 6, 2025 16:01
Cherry-pick of trinodb/trino@f7a8471

Co-Authored-By: "Adam J. Shook" <shook@datacatessen.com>
@bibith4 bibith4 force-pushed the zookeeper_update_v1.1.6 branch from e844c9b to 4b03b38 Compare May 6, 2025 16:08
@bibith4 bibith4 requested a review from BryanCutler May 7, 2025 03:37
@aaneja aaneja merged commit 0d3a2ed into prestodb:master May 7, 2025
97 checks passed
@ZacBlanco ZacBlanco mentioned this pull request May 29, 2025
21 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

from:IBM PR from IBM

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants