Skip to content

Conversation

@ramurm2013-droid
Copy link
Contributor

ELR FOR com.linkedin.transport:transportable-udfs-test-spark_2.11:0.1.21 started failing at validation step due to below vulnerability. Suggested fix is to update org.apache.spark:spark-parent_2.11 from 2.3.0 to 2.4.6

org.apache.spark:spark-parent_2.11:2.3.0
Notes: Vulnerability found and is blocked by oss-canary: vulnerability: In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc). remediation: Refer to the links for remediation. vulnerability: In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc). remediation: Upgrade org.apache.spark:spark-parent_2.11 from 2.3.0 to 2.4.6 to fix the vulnerability.

@aastha25 aastha25 merged commit e2501a9 into linkedin:1.0.1-hotfix Oct 30, 2025
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants