[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE-2022-40954: Apache Airflow Spark Provider, Apache Airflow: Airflow 2.3.4 spark pr
From: Jarek Potiuk <potiuk () apache ! org>
Date: 2022-11-21 20:41:11
Message-ID: f62db289-55b5-0163-ab99-783c23f2185b () apache ! org
[Download RAW message or body]
Description:
Improper Neutralization of Special Elements used in an OS Command ('OS =
Command Injection') vulnerability in Apache Airflow Spark Provider, Apache =
Airflow allows an attacker to read arbtrary files in the task execution =
context, without write access to DAG files. This issue affects Spark =
Provider versions prior to 4.0.0. It also impacts any Apache Airflow =
versions prior to 2.3.0 in case Spark Provider is installed (Spark Provider=
4.0.0 can only be installed for Airflow 2.3.0+). Note that you need to =
manually install the Spark Provider version 4.0.0 in order to get rid of =
the vulnerability on top of Airflow 2.3.0+ version that has lower version =
of the Spark Provider installed).
Credit:
Apache Airflow PMC wants to thank id_No2015429 of 3H Security Team for =
reporting the issue.
References:
https://github.com/apache/airflow/pull/27646
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic