Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.hadoop/hadoop-yarn-server-nodemanager@3.2.4
purl pkg:maven/org.apache.hadoop/hadoop-yarn-server-nodemanager@3.2.4
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (2)
Vulnerability Summary Aliases
VCID-a8xd-ukj7-tqbk Apache Hadoop argument injection vulnerability Apache Hadoop's `FileUtil.unTar(File, File)` API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn localization, which does enable remote code execution. It is used in Apache Spark, from the SQL command ADD ARCHIVE. As the ADD ARCHIVE command adds new binaries to the classpath, being able to execute shell scripts does not confer new permissions to the caller. SPARK-38305. "Check existence of file before untarring/zipping", which is included in 3.3.0, 3.1.4, 3.2.2, prevents shell commands being executed, regardless of which version of the hadoop libraries are in use. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.3 or upper (including HADOOP-18136). CVE-2022-25168
GHSA-8wm5-8h9c-47pc
VCID-r29h-hzhg-uyce Deserialization of Untrusted Data in Apache Hadoop YARN ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (containing YARN-11126) if ZKConfigurationStore is used. CVE-2021-25642
GHSA-rr2m-gffv-mgrj

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T22:07:37.243415+00:00 GitLab Importer Fixing VCID-r29h-hzhg-uyce https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2021-25642.yml 38.4.0
2026-04-16T22:06:43.052154+00:00 GitLab Importer Fixing VCID-a8xd-ukj7-tqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2022-25168.yml 38.4.0
2026-04-11T23:23:59.146907+00:00 GitLab Importer Fixing VCID-r29h-hzhg-uyce https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2021-25642.yml 38.3.0
2026-04-11T23:22:56.499009+00:00 GitLab Importer Fixing VCID-a8xd-ukj7-tqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2022-25168.yml 38.3.0
2026-04-02T23:30:27.120839+00:00 GitLab Importer Fixing VCID-r29h-hzhg-uyce https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2021-25642.yml 38.1.0
2026-04-02T23:29:35.524603+00:00 GitLab Importer Fixing VCID-a8xd-ukj7-tqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2022-25168.yml 38.1.0
2026-04-01T17:51:56.220015+00:00 GitLab Importer Fixing VCID-r29h-hzhg-uyce https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2021-25642.yml 38.0.0
2026-04-01T17:50:59.651369+00:00 GitLab Importer Fixing VCID-a8xd-ukj7-tqbk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.hadoop/hadoop-yarn-server-nodemanager/CVE-2022-25168.yml 38.0.0