Thanks Steve, you're 100% correct, we're reacting to downstream customers being 
alerted by scanners to the presence of the "vulnerable" commons-text dependency.
We're looking for reliable information to convey downstream. Thanks again.

From: Steve Loughran <ste...@cloudera.com>
Sent: Thursday, October 27, 2022 12:37 PM
To: Sean Owen <sro...@gmail.com>
Cc: Pastrana, Rodrigo (RIS-BCT) <rodrigo.pastr...@lexisnexisrisk.com>; 
dev@spark.apache.org
Subject: Re: CVE-2022-42889

You don't often get email from ste...@cloudera.com<mailto:ste...@cloudera.com>. 
Learn why this is important<https://aka.ms/LearnAboutSenderIdentification>

*** External email: use caution ***



the api doesn't get used in the hadoop libraries; not sure about other 
dependencies.

probably makes sense to say on the jira that there's no need to panic here; 
I've had to start doing that as some of the security scanners appear to 
overreact

https://issues.apache.org/jira/browse/HDFS-16766<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FHDFS-16766&data=05%7C01%7CRodrigo.Pastrana%40lexisnexisrisk.com%7Cab1cc34d9c3e403c8bf708dab8398a77%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C638024854534303468%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=5OY0urII%2BlnXFmePhcKbKhQVbu5p%2BFo0oWXeORvL0mU%3D&reserved=0>

On Thu, 27 Oct 2022 at 16:56, Sean Owen 
<sro...@gmail.com<mailto:sro...@gmail.com>> wrote:
Right. It seems there is only one direct use of that part of commons-text, and 
it is not applied to user-supplied inputs (reads and substitutes into error 
message templates).
At a glance I do not see how it would affect Spark; it's not impossible that it 
does. In any event, commons-text is being updated anyway in branch 3.2 and 
later, so this will be updated in maintained branches eventually. It missed the 
3.3.1 release, but my message is, it's also not even clear it matters to Spark.

I don't think this would become a Spark CVE; it affects commons-text. Sometimes 
CVEs note other affected software products when they are widely-used and very 
directly affected. But typically they would not list every single downstream 
user, let alone generate separate CVEs, and in any event here I do not see an 
argument that it affects Spark anyway.

On Thu, Oct 27, 2022 at 10:08 AM Pastrana, Rodrigo (RIS-BCT) 
<rodrigo.pastr...@lexisnexisrisk.com<mailto:rodrigo.pastr...@lexisnexisrisk.com>>
 wrote:
Thanks Sean,
I assume Spark's not affected because it either doesn't reference the affected 
API(s) or because it does not unsafely utilize user input through the 
vulnerable API(s), but is there an official statement about this from Spark?
We weren't able to find references to 2022-42889 here: 
https://spark.apache.org/security.html<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fspark.apache.org%2Fsecurity.html&data=05%7C01%7CRodrigo.Pastrana%40lexisnexisrisk.com%7Cab1cc34d9c3e403c8bf708dab8398a77%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C638024854534303468%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ruLjGWPKmyUC6uGE9ONiOjgLYN6Tcg2cEWqzDQwP2Iw%3D&reserved=0>
 (likely because Spark determined it is not affected?)

From: Sean Owen <sro...@gmail.com<mailto:sro...@gmail.com>>
Sent: Thursday, October 27, 2022 10:27 AM
To: Pastrana, Rodrigo (RIS-BCT) 
<rodrigo.pastr...@lexisnexisrisk.com.invalid<mailto:rodrigo.pastr...@lexisnexisrisk.com.invalid>>
Cc: dev@spark.apache.org<mailto:dev@spark.apache.org>
Subject: Re: CVE-2022-42889

You don't often get email from sro...@gmail.com<mailto:sro...@gmail.com>. Learn 
why this is important<https://aka.ms/LearnAboutSenderIdentification>

*** External email: use caution ***


Probably a few months between maintenance releases.
It does not appear to affect Spark, however.

On Thu, Oct 27, 2022 at 9:24 AM Pastrana, Rodrigo (RIS-BCT) 
<rodrigo.pastr...@lexisnexisrisk.com.invalid<mailto:rodrigo.pastr...@lexisnexisrisk.com.invalid>>
 wrote:
Hello,
This issue 
(SPARK-40801)<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fissues.apache.org%2Fjira%2Fbrowse%2FSPARK-40801&data=05%7C01%7CRodrigo.Pastrana%40lexisnexisrisk.com%7Cab1cc34d9c3e403c8bf708dab8398a77%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C638024854534303468%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=trU3KpsjUMc1mCMUadFKcloRFKi3HjgrZv27zs0BJH4%3D&reserved=0>
 which addresses CVE-2022-42889 doesn't seem to have been included in the 
latest release 
(3.3.1<https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fspark.apache.org%2Freleases%2Fspark-release-3-3-1.html&data=05%7C01%7CRodrigo.Pastrana%40lexisnexisrisk.com%7Cab1cc34d9c3e403c8bf708dab8398a77%7C9274ee3f94254109a27f9fb15c10675d%7C0%7C0%7C638024854534303468%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=4SAXOZGPmTX0ScceE9MY2TyOqP76BnheKMGrPuzDYxs%3D&reserved=0>).
Is there a way to estimate a timeline for the first release which includes that 
change (likely 3.3.2)? Much appreciation!

________________________________
The information contained in this e-mail message is intended only for the 
personal and confidential use of the recipient(s) named above. This message may 
be an attorney-client communication and/or work product and as such is 
privileged and confidential. If the reader of this message is not the intended 
recipient or an agent responsible for delivering it to the intended recipient, 
you are hereby notified that you have received this document in error and that 
any review, dissemination, distribution, or copying of this message is strictly 
prohibited. If you have received this communication in error, please notify us 
immediately by e-mail, and delete the original message.

________________________________
The information contained in this e-mail message is intended only for the 
personal and confidential use of the recipient(s) named above. This message may 
be an attorney-client communication and/or work product and as such is 
privileged and confidential. If the reader of this message is not the intended 
recipient or an agent responsible for delivering it to the intended recipient, 
you are hereby notified that you have received this document in error and that 
any review, dissemination, distribution, or copying of this message is strictly 
prohibited. If you have received this communication in error, please notify us 
immediately by e-mail, and delete the original message.

________________________________
The information contained in this e-mail message is intended only for the 
personal and confidential use of the recipient(s) named above. This message may 
be an attorney-client communication and/or work product and as such is 
privileged and confidential. If the reader of this message is not the intended 
recipient or an agent responsible for delivering it to the intended recipient, 
you are hereby notified that you have received this document in error and that 
any review, dissemination, distribution, or copying of this message is strictly 
prohibited. If you have received this communication in error, please notify us 
immediately by e-mail, and delete the original message.

Reply via email to