Skip to content

Update dependency org.apache.calcite.avatica:avatica-core to v1.22.0 [SECURITY] (master) - autoclosed#286

Closed
renovatebot-confluentinc[bot] wants to merge 1 commit intomasterfrom
renovate/master-maven-org.apache.calcite.avatica-avatica-core-vulnerability
Closed

Update dependency org.apache.calcite.avatica:avatica-core to v1.22.0 [SECURITY] (master) - autoclosed#286
renovatebot-confluentinc[bot] wants to merge 1 commit intomasterfrom
renovate/master-maven-org.apache.calcite.avatica-avatica-core-vulnerability

Conversation

@renovatebot-confluentinc
Copy link

@renovatebot-confluentinc renovatebot-confluentinc bot commented Jan 31, 2025

For any questions/concerns about this PR, please review the Renovate Bot wiki/FAQs, or the #renovatebot Slack channel.

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
org.apache.calcite.avatica:avatica-core (source) 1.12.0 -> 1.22.0 age adoption passing confidence

Warning

Some dependencies could not be looked up. Check the warning logs for more information.

GitHub Vulnerability Alerts

CVE-2022-36364

Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via httpclient_impl connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution. To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters; 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath. From Apache Calcite Avatica 1.22.0 onwards, it will be verified that the class implements the expected interface before invoking its constructor.


Apache Calcite Avatica JDBC driver arbitrary code execution

CVE-2022-36364 / GHSA-w7f5-jrpr-5c2m

More information

Details

Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via httpclient_impl connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare cases remote code execution. To exploit the vulnerability: 1) the attacker needs to have privileges to control JDBC connection parameters; 2) and there should be a vulnerable class (constructor with URL parameter and ability to execute code) in the classpath. From Apache Calcite Avatica 1.22.0 onwards, it will be verified that the class implements the expected interface before invoking its constructor.

Severity

  • CVSS Score: 8.8 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@service-bot-app service-bot-app bot marked this pull request as ready for review January 31, 2025 04:17
@service-bot-app service-bot-app bot requested a review from a team as a code owner January 31, 2025 04:17
@renovatebot-confluentinc renovatebot-confluentinc bot changed the title Update dependency org.apache.calcite.avatica:avatica-core to v1.22.0 [SECURITY] (master) Update dependency org.apache.calcite.avatica:avatica-core to v1.22.0 [SECURITY] (master) - autoclosed Feb 18, 2026
@renovatebot-confluentinc renovatebot-confluentinc bot deleted the renovate/master-maven-org.apache.calcite.avatica-avatica-core-vulnerability branch February 18, 2026 20:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants