[ 
https://issues.apache.org/jira/browse/SPARK-51035?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17952027#comment-17952027
 ] 

Yang Jie commented on SPARK-51035:
----------------------------------

Upgrading Derby requires waiting for the Derby community to release a new 
v.10.16 version, Although Derby v.10.17 has resolved the issue, it necessitates 
the use of at least Java 19, whereas Spark needs to be compatible with Java 17.

> Upgrade dependencies exposed to critical and high CVEs
> ------------------------------------------------------
>
>                 Key: SPARK-51035
>                 URL: https://issues.apache.org/jira/browse/SPARK-51035
>             Project: Spark
>          Issue Type: Dependency upgrade
>          Components: PySpark
>    Affects Versions: 4.0.0
>            Reporter: Marina Gonzalez
>            Priority: Critical
>
> Several outdated library dependencies still referenced in *PySpark 4.0.0* 
> contain {*}high/critical security vulnerabilities (CVEs){*}. If not updated, 
> these vulnerabilities could affect users who rely on PySpark for production 
> workloads.
>  * 
> {color:#172b4d}[{*}derby{*}:|https://github.com/apache/spark/blob/b49ef2ada0fcce7e3b5559abaf067d11f324d733/pom.xml#L139]{color}
>  
> _[v.10.16.1.1|https://github.com/apache/spark/blob/b49ef2ada0fcce7e3b5559abaf067d11f324d733/pom.xml#L139]_
>  referenced by pyspark4.0.0 does [not 
> resolve|https://mvnrepository.com/artifact/org.apache.derby/derby/10.16.1.1] 
> the vulnerability ([NVD - 
> CVE-2022-46337|https://nvd.nist.gov/vuln/detail?vulnId=CVE-2022-46337])
>  * {*}libfb303-0.9.3.jar{*}: 
> [v.0.9.3|https://github.com/apache/spark/blob/b49ef2ada0fcce7e3b5559abaf067d11f324d733/pom.xml#L2486]
>  is still referenced by pyspark4.0.0 does [not 
> resolve|https://mvnrepository.com/artifact/org.apache.thrift/libfb303/0.9.3] 
> some key vulnerabilities
>  ** libfb303-0.9.3.jar comes from thrift v0.9.3 which is 10 years old (flag)
>  * {*}janino-3.1.9.jar{*}: 
> [v.3.1.9|https://github.com/apache/spark/blob/b49ef2ada0fcce7e3b5559abaf067d11f324d733/pom.xml#L200]
>  still referenced by pyspark4.0.0 does [not 
> resolve|https://nvd.nist.gov/vuln/detail/CVE-2023-33546] the vulnerability 
> ([NVD - 
> CVE-2023-33546|https://nvd.nist.gov/vuln/detail?vulnId=CVE-2023-33546])
> These vulnerabilities affect Spark users by:
>  * Exposing PySpark workflows to potential security risks.
>  * Including outdated dependencies that lack recent security fixes.
>  * Forcing users to patch Spark manually instead of using an official release.
> Expected Behaviour:
>  * Ideally, the dependencies should be upgraded to their latest secure 
> versions before the final release of PySpark 4.0.0.



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@spark.apache.org
For additional commands, e-mail: issues-h...@spark.apache.org

Reply via email to