Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS02Z2NoLTYzd3AtNHY1Zs4AA_wz
Apache Linkis Spark EngineConn: Commons Lang's RandomStringUtils Random string security vulnerability
In Apache Linkis <= 1.5.0, a Random string security vulnerability in Spark EngineConn, random string generated by the Token when starting Py4j uses the Commons Lang's RandomStringUtils.
Users are recommended to upgrade to version 1.6.0, which fixes this issue.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS02Z2NoLTYzd3AtNHY1Zs4AA_wz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 18 days ago
Updated: 18 days ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-6gch-63wp-4v5f, CVE-2024-39928
References:
- https://nvd.nist.gov/vuln/detail/CVE-2024-39928
- https://github.com/apache/linkis/commit/82c2f4b201b746e9206bb58ef98f536fc333aa07
- https://lists.apache.org/thread/g664n13nb17rsogcfrn8kjgd8m89p8nw
- https://github.com/advisories/GHSA-6gch-63wp-4v5f
Blast Radius: 0.0
Affected Packages
maven:org.apache.linkis:linkis-engineplugin-spark
Dependent packages: 0Dependent repositories: 1
Downloads:
Affected Version Ranges: < 1.6.0
Fixed in: 1.6.0
All affected versions: 1.0.3, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.5.0
All unaffected versions: 1.6.0