Total vulnerabilities in the database
In Apache Spark 1.0.0 to 2.1.2, 2.2.0 to 2.2.1, and 2.3.0, when using PySpark or SparkR, it's possible for a different local user to connect to the Spark application and impersonate the user running the Spark application.
Software | From | Fixed in |
---|---|---|
apache / spark | 2.2.0 | 2.2.1.x |
apache / spark | 2.3.0 | 2.3.0.x |
apache / spark | - | 2.1.2.x |
![]() |
1.0.0 | 2.1.3 |
![]() |
2.2.0 | 2.2.2 |
![]() |
1.0.0 | 2.1.3 |
![]() |
2.2.0 | 2.2.2 |
![]() |
2.3.0 | 2.3.0.x |
![]() |
2.3.0 | 2.3.1 |