Search for packages
| purl | pkg:maven/org.apache.hadoop/hadoop-common@3.0.0-alpha3 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-3fz1-e6n6-rfh6
Aliases: CVE-2024-23454 GHSA-f5fw-25gw-5m92 |
Apache Hadoop: Temporary File Local Information Disclosure Apache Hadoop’s `RunJar.run()` does not set permissions for temporary directory by default. If sensitive data will be present in this file, all the other local users may be able to view the content. This is because, on unix-like systems, the system temporary directory is shared between all local users. As such, files written in this directory, without setting the correct posix permissions explicitly, may be viewable by all other local users. |
Affected by 0 other vulnerabilities. |
|
VCID-6fnh-mjwd-9qee
Aliases: CVE-2018-8029 GHSA-37pw-qw47-4jxm |
Privilege escalation A user who can escalate to yarn user can possibly run arbitrary commands as root user. |
Affected by 3 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-ncuc-8grw-ubep | In Apache Hadoop 2.8.0, 3.0.0-alpha1, and 3.0.0-alpha2, the LinuxContainerExecutor runs docker commands as root with insufficient input validation. When the docker feature is enabled, authenticated users can run commands as root. |
CVE-2017-7669
GHSA-h24p-qwf4-84q8 |