CVE-2021-38296

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-38296
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-38296.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-38296
Aliases
Published
2022-03-10T09:15:07Z
Modified
2024-10-12T08:15:08.351427Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Apache Spark supports end-to-end encryption of RPC connections via "spark.authenticate" and "spark.network.crypto.enabled". In versions 3.1.2 and earlier, it uses a bespoke mutual authentication protocol that allows for full encryption key recovery. After an initial interactive attack, this would allow someone to decrypt plaintext traffic offline. Note that this does not affect security mechanisms controlled by "spark.authenticate.enableSaslEncryption", "spark.io.encryption.enabled", "spark.ssl", "spark.ui.strictTransportSecurity". Update to Apache Spark 3.1.3 or later

References

Affected packages

Git / github.com/apache/spark

Affected ranges

Type
GIT
Repo
https://github.com/apache/spark
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.3-scala-2.8
0.3-scala-2.9

alpha-0.*

alpha-0.1
alpha-0.2

v0.*

v0.5.0
v0.5.1
v0.6.0
v0.7.0

v3.*

v3.0.0-preview
v3.0.0-preview-rc1
v3.0.0-preview-rc2
v3.1.0-rc1
v3.1.1
v3.1.1-rc1
v3.1.1-rc2
v3.1.1-rc3
v3.1.2
v3.1.2-rc1
v3.1.3-rc1
v3.1.3-rc2
v3.1.3-rc3