Can you connect the CVE to Spark?
Spark does not run a Hive metastore itself nor use Hive for executing
queries. It is a Hive client in general. That seems to be what is affected.

We ask people reporting issues to at least provide a plausible theory for a
vulnerability. Just because A depends on B does not mean it's use of B
includes all vulnerabilities in B.

We do not pursue reports that just note a dependency has a vulnerability on
that basis alone.

Of course, all else equal, you just update dependencies. Hive is hard to
update.

(I am referring to Mich's replies. I understand the CVE is real)

On Mon, Jan 27, 2025, 10:54 PM Balaji Sudharsanam V <
balaji.sudharsa...@ibm.com> wrote:

> Sean,
>
> The vulnerability is explained here, Apache Hive security bypass
> CVE-2021-34538 Vulnerability Report
> <https://exchange.xforce.ibmcloud.com/vulnerabilities/231404>
>
> It’s CVSS base score is 7.5 and it is not an AI gen content for sure. We
> can dig into the vulnerability though, but it can be a different discussion.
>
>
>
> As long as Spark contains a vulnerable jar in its packaging, it is good to
> address this.
>
>
>
> Thanks,
>
> Balaji
>
>
>
>
> *From:* Mich Talebzadeh <mich.talebza...@gmail.com>
> *Sent:* 27 January 2025 20:41
> *To:* Sean Owen <sro...@gmail.com>
> *Cc:* Balaji Sudharsanam V <balaji.sudharsa...@ibm.com>;
> dev@spark.apache.org
> *Subject:* [EXTERNAL] Re: Spark 4.0 vulnerable with
> hive-metastore-2.3.x.jar versions
>
>
>
> To answer your question, I did not read this CVE, but I am responding
> solely from my previous experiences with vulennabiries and the thread owner
> implications, having used spark in conjunction with Spark for many years.
> Mich Talebzadeh, Architect
>
> To answer your question, I did not read this CVE, but I am responding
> solely from my previous experiences with vulennabiries and the thread owner
> implications, having used spark in conjunction with Spark for  many years.
>
>
>
>
>
> Mich Talebzadeh,
>
> Architect | Data Science | Financial Crime | Forensic Analysis | GDPR
>
>
>
>    view my Linkedin profile
> <https://www.linkedin.com/in/mich-talebzadeh-ph-d-5205b2/>
>
>
>
>
>
>
>
>
>
> On Mon, 27 Jan 2025 at 15:03, Sean Owen <sro...@gmail.com> wrote:
>
> Mich: did you read the CVE? I'm not clear, as this contains no reference
> to the Hive functionality that is affected, or how it might relate to a
> metastore. Please explain. Otherwise this looks like a generic AI-generated
> response with no particularly relevant content. "In summary"...
>
>
>
> On Mon, Jan 27, 2025 at 8:57 AM Mich Talebzadeh <mich.talebza...@gmail.com>
> wrote:
>
> I think the thread owner's point is valid. The default use of the Hive
> Metastore by Spark further gives credence to the importance of addressing
> this Hive vulnerability to ensure the security and reliability of Spark
> applications. I use Hive as the default metastore for Spark as well. Spark
> relies heavily on the Hive Metastore for managing critical metadata, such
> as table schemas, data locations, and access control, unless you are using
> a platform like Databricks with a unified catalog. In summary, this
> dependency makes it essential to address any vulnerabilities within the
> Hive Metastore, as they can indirectly impact the security and stability of
> Spark applications among other things
>
>
>
> HTH
>
>
>
> Mich Talebzadeh,
>
> Architect | Data Science | Financial Crime | Forensic Analysis | GDPR
>
>
>
>    view my Linkedin profile
> <https://www.linkedin.com/in/mich-talebzadeh-ph-d-5205b2/>
>
>
>
>
>
>
>
>
>
> On Mon, 27 Jan 2025 at 13:37, Sean Owen <sro...@gmail.com> wrote:
>
> It looks like that affects Hive, and not the metastore. I do not see that
> it is relevant to Spark at first glance.
>
>
>
>
>
> On Mon, Jan 27, 2025 at 1:21 AM Balaji Sudharsanam V <
> balaji.sudharsa...@ibm.com.invalid> wrote:
>
> Hi All,
>
> There is a vulnerability with ‘High’ severity found in the *Apache Spark
> 3.x and 4.0.0 preview (2) releases,* with the hive-metastore-2.3.x.jar.
> This is defined here, Apache Hive security bypass CVE-2021-34538
> Vulnerability Report
> <https://exchange.xforce.ibmcloud.com/vulnerabilities/231404>
>
>
>
> The recommendation is to use upgrade to the latest version of Apache Hive
> (*3.1.3, 4.0 or later*), available from the Apache Web site.
>
>
>
> Can we expect this getting fixed in the Apache Spark 4.0 GA ?
>
> Thanks,
>
> Balaji
>
>
>
>

Reply via email to