Skip to content

chore(hive): Bump dependencies ahead of 25.7.0 #1100

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 8 commits into from
Jun 1, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,8 @@ All notable changes to this project will be documented in this file.
- zookeeper: reduce docker image size by removing the recursive chown/chmods in the final image ([#1043]).
- Fixed two hardcoded username references ([#1052]).
- ubi9-rust-builder: Use pinned `rustup` version ([#1121]).
- hive: Patch for postgres CVE-2024-1597 ([#1100]).
- bump image-tools (for `bake`) and nixpkgs (for `nodejs_20`, used by pre-commit) ([#1100]).

### Removed

Expand Down Expand Up @@ -131,6 +133,7 @@ All notable changes to this project will be documented in this file.
[#1097]: https://github.com/stackabletech/docker-images/pull/1097
[#1098]: https://github.com/stackabletech/docker-images/pull/1098
[#1099]: https://github.com/stackabletech/docker-images/pull/1099
[#1100]: https://github.com/stackabletech/docker-images/pull/1100
[#1101]: https://github.com/stackabletech/docker-images/pull/1101
[#1102]: https://github.com/stackabletech/docker-images/pull/1102
[#1103]: https://github.com/stackabletech/docker-images/pull/1103
Expand Down
4 changes: 4 additions & 0 deletions hive/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,10 @@ ln -s "/stackable/jmx/jmx_prometheus_javaagent-${JMX_EXPORTER}.jar" /stackable/j

# Add S3 Support for Hive (support for s3a://)
cp /stackable/hadoop-${HADOOP}/share/hadoop/tools/lib/hadoop-aws-${HADOOP}.jar /stackable/apache-hive-metastore-${PRODUCT}-bin/lib/

# According to https://hadoop.apache.org/docs/stable/hadoop-aws/tools/hadoop-aws/aws_sdk_upgrade.html, the jar filename has changed from
# aws-java-sdk-bundle-${AWS_JAVA_SDK_BUNDLE}.jar to bundle-${AWS_JAVA_SDK_BUNDLE}.jar. In future, you might need to do:
# cp /stackable/hadoop-${HADOOP}/share/hadoop/tools/lib/bundle-${AWS_JAVA_SDK_BUNDLE}.jar /stackable/apache-hive-metastore-${PRODUCT}-bin/lib/
cp /stackable/hadoop-${HADOOP}/share/hadoop/tools/lib/aws-java-sdk-bundle-${AWS_JAVA_SDK_BUNDLE}.jar /stackable/apache-hive-metastore-${PRODUCT}-bin/lib/

# Add Azure ABFS support (support for abfs://)
Expand Down
47 changes: 47 additions & 0 deletions hive/stackable/patches/4.0.0/0005-Fix-CVE-2024-1597.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
From 85fab788520b73e514e52e0753d36dafdf513e5b Mon Sep 17 00:00:00 2001
From: Nick Larsen <[email protected]>
Date: Thu, 15 May 2025 14:14:28 +0200
Subject: Fix CVE-2024-1597

See https://github.com/stackabletech/vulnerabilities/issues/681

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using
PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there
is no vulnerability. A placeholder for a numeric value must be immediately
preceded by a minus. There must be a second placeholder for a string value after
the first placeholder; both must be on the same line. By constructing a matching
string payload, the attacker can inject SQL to alter the query,bypassing the
protections that parameterized queries bring against SQL Injection attacks.
Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are
affected.
---
pom.xml | 2 +-
standalone-metastore/pom.xml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/pom.xml b/pom.xml
index a4dfc8d1e4..699228cba3 100644
--- a/pom.xml
+++ b/pom.xml
@@ -178,7 +178,7 @@
<mariadb.version>2.5.0</mariadb.version>
<mssql.version>6.2.1.jre8</mssql.version>
<mysql.version>8.0.31</mysql.version>
- <postgres.version>42.5.1</postgres.version>
+ <postgres.version>42.5.6</postgres.version>
<oracle.version>21.3.0.0</oracle.version>
<opencsv.version>2.3</opencsv.version>
<orc.version>1.8.5</orc.version>
diff --git a/standalone-metastore/pom.xml b/standalone-metastore/pom.xml
index cd34884e3b..da84c8928e 100644
--- a/standalone-metastore/pom.xml
+++ b/standalone-metastore/pom.xml
@@ -72,7 +72,7 @@
<mariadb.version>2.5.0</mariadb.version>
<mssql.version>6.2.1.jre8</mssql.version>
<mysql.version>8.0.31</mysql.version>
- <postgres.version>42.5.1</postgres.version>
+ <postgres.version>42.5.6</postgres.version>
<oracle.version>21.3.0.0</oracle.version>
<dropwizard-metrics-hadoop-metrics2-reporter.version>0.1.2
</dropwizard-metrics-hadoop-metrics2-reporter.version>
47 changes: 47 additions & 0 deletions hive/stackable/patches/4.0.1/0005-Fix-CVE-2024-1597.patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
From 134b9e22475b3ae59eabbc0bf5c188912dc2393b Mon Sep 17 00:00:00 2001
From: Nick Larsen <[email protected]>
Date: Thu, 15 May 2025 14:14:28 +0200
Subject: Fix CVE-2024-1597

See https://github.com/stackabletech/vulnerabilities/issues/681

pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using
PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there
is no vulnerability. A placeholder for a numeric value must be immediately
preceded by a minus. There must be a second placeholder for a string value after
the first placeholder; both must be on the same line. By constructing a matching
string payload, the attacker can inject SQL to alter the query,bypassing the
protections that parameterized queries bring against SQL Injection attacks.
Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are
affected.
---
pom.xml | 2 +-
standalone-metastore/pom.xml | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)

diff --git a/pom.xml b/pom.xml
index 1898adeebe..89cf93ed37 100644
--- a/pom.xml
+++ b/pom.xml
@@ -179,7 +179,7 @@
<mariadb.version>2.5.0</mariadb.version>
<mssql.version>6.2.1.jre8</mssql.version>
<mysql.version>8.0.31</mysql.version>
- <postgres.version>42.5.1</postgres.version>
+ <postgres.version>42.5.6</postgres.version>
<oracle.version>21.3.0.0</oracle.version>
<opencsv.version>2.3</opencsv.version>
<orc.version>1.8.5</orc.version>
diff --git a/standalone-metastore/pom.xml b/standalone-metastore/pom.xml
index 599ad33ed0..17dfe063e8 100644
--- a/standalone-metastore/pom.xml
+++ b/standalone-metastore/pom.xml
@@ -73,7 +73,7 @@
<mariadb.version>2.5.0</mariadb.version>
<mssql.version>6.2.1.jre8</mssql.version>
<mysql.version>8.0.31</mysql.version>
- <postgres.version>42.5.1</postgres.version>
+ <postgres.version>42.5.6</postgres.version>
<oracle.version>21.3.0.0</oracle.version>
<dropwizard-metrics-hadoop-metrics2-reporter.version>0.1.2
</dropwizard-metrics-hadoop-metrics2-reporter.version>
12 changes: 6 additions & 6 deletions nix/sources.json

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 5 additions & 3 deletions shell.nix
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
{ sources ? import ./nix/sources.nix
, nixpkgs ? sources.nixpkgs
, pkgs ? import nixpkgs { }
{
sources ? import ./nix/sources.nix,
nixpkgs ? sources.nixpkgs,
pkgs ? import nixpkgs { },
}:

let
Expand All @@ -9,6 +10,7 @@ in
pkgs.mkShell {
packages = [
bake
pkgs.nodejs_20
];

buildInputs = [
Expand Down