You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This issue tracks the upgrade of the Jetty version used in Presto to align with recent updates made in the Airlift HTTP client and server. The Jetty dependency version has been updated in the Airlift project to address security vulnerabilities and improve overall performance and stability.
Details
A pull request has been raised in the Airlift project to upgrade Jetty from version 9.4.14.v20181114 to 9.4.54.v20240208 to mitigate several security vulnerabilities and incorporate various improvements. To ensure compatibility and maintain security, we need to perform a similar upgrade in the Presto project.
Summary
This issue tracks the upgrade of the Jetty version used in Presto to align with recent updates made in the Airlift HTTP client and server. The Jetty dependency version has been updated in the Airlift project to address security vulnerabilities and improve overall performance and stability.
Details
A pull request has been raised in the Airlift project to upgrade Jetty from version
9.4.14.v20181114
to9.4.54.v20240208
to mitigate several security vulnerabilities and incorporate various improvements. To ensure compatibility and maintain security, we need to perform a similar upgrade in the Presto project.Changes Required
Remove Hardcoded Dependency Versions:
Remove hardcoded Jetty dependency versions in individual module dependency management sections.
Add Jetty BOM to Root POM:
Add the following BOM to the root
pom.xml
to manage Jetty dependencies centrally:Security Vulnerabilities Addressed
Upgrading to the latest Jetty version addresses multiple security vulnerabilities, including but not limited to:
Improvements and Bug Fixes
In addition to security fixes, the latest Jetty version includes several performance improvements and bug fixes, such as:
The text was updated successfully, but these errors were encountered: