Search for packages
| purl | pkg:pypi/pyspark@3.4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-1hnx-b71k-mqat | In Apache Spark versions prior to 3.4.0, applications using spark-submit can specify a 'proxy-user' to run as, limiting privileges. The application can execute code with the privileges of the submitting user, however, by providing malicious configuration-related classes on the classpath. This affects architectures relying on proxy-user, for example those using Apache Livy to manage submitted applications. Update to Apache Spark 3.4.0 or later, and ensure that spark.submit.proxyUser.allowCustomClasspathInClusterMode is set to its default of "false", and is not overridden by submitted applications. |
BIT-spark-2023-22946
CVE-2023-22946 GHSA-329j-jfvr-rhr6 PYSEC-2023-44 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T15:13:57.484222+00:00 | PyPI Importer | Fixing | VCID-1hnx-b71k-mqat | https://osv-vulnerabilities.storage.googleapis.com/PyPI/all.zip | 38.0.0 |
| 2026-04-01T12:48:13.702377+00:00 | Pypa Importer | Fixing | VCID-1hnx-b71k-mqat | https://github.com/pypa/advisory-database/blob/main/vulns/pyspark/PYSEC-2023-44.yaml | 38.0.0 |