Hi Spark Community,
>
>
>
> I hope you are doing well.
>
> We have identified high and critical CVEs related to the
> jackson-mapper-asl package used in Apache Spark 3.5.5. We would like to
> understand if there are any official fixes or recommended mitigation steps
> avai
Hi Spark Community,
I hope you are doing well.
We have identified high and critical CVEs related to the jackson-mapper-asl
package used in Apache Spark 3.5.5. We would like to understand if there are
any official fixes or recommended mitigation steps available for these
vulnerabilities.
| CVE
ributors.
>>>>
>>>> On Mon, Jun 21, 2021 at 3:43 PM Sean Owen wrote:
>>>>
>>>>> Whether it matters really depends on whether the CVE affects Spark.
>>>>> Sometimes it clearly could and so we'd try to back-port dependency update
ck-port dependency updates
>>>> to active branches.
>>>> Sometimes it clearly doesn't and hey sometimes the dependency is
>>>> updated anyway for good measure (mostly to keep this off static analyzer
>>>> reports) but probably wouldn'
early doesn't and hey sometimes the dependency is updated
>>> anyway for good measure (mostly to keep this off static analyzer reports)
>>> but probably wouldn't backport.
>>>
>>> Jackson has been a persistent one but in this case Spark is already on
&
ackport.
>>
>> Jackson has been a persistent one but in this case Spark is already on
>> 2.12.x in master, and it wasn't clear last time I looked at those CVEs that
>> they can affect Spark itself. End user apps perhaps, but those apps can
>> supply their ow
; anyway for good measure (mostly to keep this off static analyzer reports)
>> but probably wouldn't backport.
>>
>> Jackson has been a persistent one but in this case Spark is already on
>> 2.12.x in master, and it wasn't clear last time I looked at those CVEs tha
r reports)
> but probably wouldn't backport.
>
> Jackson has been a persistent one but in this case Spark is already on
> 2.12.x in master, and it wasn't clear last time I looked at those CVEs that
> they can affect Spark itself. End user apps perhaps, but those apps can
> supp
off static analyzer reports)
but probably wouldn't backport.
Jackson has been a persistent one but in this case Spark is already on
2.12.x in master, and it wasn't clear last time I looked at those CVEs that
they can affect Spark itself. End user apps perhaps, but those apps can
supply th
Hi,
I am working with Spark 3.1.2 and getting several vulnerabilities popping
up. I am wondering if the Spark distros are scanned etc. and how people
resolve these.
For example. I am finding - https://nvd.nist.gov/vuln/detail/CVE-2020-25649
This looks like it is fixed in 2.11.0 -
https://github.
10 matches
Mail list logo