You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@spark.apache.org by Sean Owen <sr...@apache.org> on 2017/09/08 11:20:21 UTC
CVE-2017-12612 Unsafe deserialization in Apache Spark launcher API
Severity: Medium
Vendor: The Apache Software Foundation
Versions Affected:
Versions of Apache Spark from 1.6.0 until 2.1.1
Description:
In Apache Spark 1.6.0 until 2.1.1, the launcher API performs unsafe
deserialization of data received by its socket. This makes applications
launched programmatically using the launcher API potentially
vulnerable to arbitrary code execution by an attacker with access to any
user
account on the local machine. It does not affect apps run by spark-submit or
spark-shell. The attacker would be able to execute code as the user that ran
the Spark application. Users are encouraged to update to version 2.2.0 or
later.
Mitigation:
Update to Apache Spark 2.2.0 or later.
Credit:
Aditya Sharad, Semmle