Search for packages
purl | pkg:maven/org.apache.spark/spark-core@2.3.0 |
Tags | Ghost |
Next non-vulnerable version | None. |
Latest non-vulnerable version | None. |
Risk | 4.0 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-2md5-chbw-aaaj
Aliases: CVE-2018-1334 GHSA-6mqq-8r44-vmjc PYSEC-2018-25 |
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. |
Affected by 1 other vulnerability. |
VCID-6e2g-d1n5-aaam
Aliases: CVE-2019-10099 GHSA-fp5j-3fpf-mhj5 PYSEC-2019-114 PYSEC-2019-44 |
Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs. |
Affected by 0 other vulnerabilities. |
VCID-xr14-da7p-aaam
Aliases: CVE-2018-8024 GHSA-8cw6-5qvp-q3wj |
Low severity vulnerability that affects org.apache.spark:spark-core_2.10 and org.apache.spark:spark-core_2.11 |
Affected by 1 other vulnerability. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |