CVE-2019-10099 – pyspark
Package
Manager: pip
Name: pyspark
Vulnerable Version: >=0 <2.3.3
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.00542 pctl0.66709
Details
Sensitive data written to disk unencrypted in Spark Prior to Spark 2.3.3, in certain situations Spark would write user data to local disk unencrypted, even if spark.io.encryption.enabled=true. This includes cached blocks that are fetched to disk (controlled by spark.maxRemoteBlockSizeFetchToMem); in SparkR, using parallelize; in Pyspark, using broadcast and parallelize; and use of python udfs.
Metadata
Created: 2019-08-08T15:18:22Z
Modified: 2024-10-24T21:48:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/08/GHSA-fp5j-3fpf-mhj5/GHSA-fp5j-3fpf-mhj5.json
CWE IDs: ["CWE-312"]
Alternative ID: GHSA-fp5j-3fpf-mhj5
Finding: F020
Auto approve: 1