First published: Mon Feb 04 2019(Updated: )
When using PySpark , it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application. This affects versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/pyspark | >=1.0.2<2.2.3 | 2.2.3 |
pip/pyspark | >=2.3.0<2.3.2 | 2.3.2 |
Apache Spark | >=1.0.2<=1.6.3 | |
Apache Spark | >=2.0.0<=2.0.2 | |
Apache Spark | >=2.1.0<=2.1.3 | |
Apache Spark | >=2.2.0<=2.2.2 | |
Apache Spark | >=2.3.0<=2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11760 is a vulnerability related to PySpark that allows a different local user to connect to the Spark application and impersonate the user running the application.
PySpark versions 1.x, 2.0.x, 2.1.x, 2.2.0 to 2.2.2, and 2.3.0 to 2.3.1 are affected by CVE-2018-11760.
CVE-2018-11760 has a severity rating of 5.5 (medium).
To fix CVE-2018-11760 in PySpark, update to version 2.2.3 or later for 2.2.x versions, and update to version 2.3.2 or later for 2.3.x versions.
You can find more information about CVE-2018-11760 on the NIST National Vulnerability Database (NVD) website.