<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: CVE-2022-33891 in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/352725#M236584</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;parameters you mentioned do not appear in Ambari.&lt;BR /&gt;Does that mean our clusters are running with the default settings, exposing the clusters to the vulnerability ?&lt;BR /&gt;Please, could you provide the way to set this parameters (which custom settings for Spark 1 and Spark 2 as well as the keys and values).&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Thanks in advance.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Sep 2022 12:51:26 GMT</pubDate>
    <dc:creator>jeromedruais</dc:creator>
    <dc:date>2022-09-20T12:51:26Z</dc:date>
    <item>
      <title>CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348570#M235396</link>
      <description>&lt;P&gt;Hello, a new CVE appears on Apache Spark. Does it impact every versions of Spark ?&lt;/P&gt;&lt;P&gt;&lt;A href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33891" target="_blank" rel="noopener"&gt;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33891&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 15:13:12 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348570#M235396</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2022-07-22T15:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348611#M235405</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/78359"&gt;@jeromedruais&lt;/a&gt;, this is a snown security issue &lt;EM&gt;CVE-2022-33891: Apache Spark shell command injection vulnerability via Spark UI&amp;nbsp;&lt;/EM&gt;reported in&amp;nbsp;&lt;A href="https://spark.apache.org/security.html" target="_blank" rel="noopener"&gt;https://spark.apache.org/security.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For mitigation, update to Spark 3.1.3, 3.2.2, or 3.3.0 or later&lt;/P&gt;</description>
      <pubDate>Sat, 23 Jul 2022 13:56:18 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348611#M235405</guid>
      <dc:creator>jagadeesan</dc:creator>
      <dc:date>2022-07-23T13:56:18Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348790#M235449</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/67146"&gt;@jagadeesan&lt;/a&gt; for your answer.&lt;BR /&gt;So, will you provide fixes for any HDP or CDP version to mitigate this issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 08:13:44 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/348790#M235449</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2022-07-26T08:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/349116#M235530</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/78359"&gt;@jeromedruais&lt;/a&gt;&amp;nbsp; Cluster is affected by the CVE-2022-33891 if only when the GroupMappingServiceProvider is called, i.e., when spark.history.ui.acls.enable / spark.acls.enable is enabled. Please make sure you have not enabled any Spark ACLs in your cluster. To verify you can check parameter settings via Ambari or Cloudera Manager UI -&amp;gt; spark configurations -&amp;gt; search for parameter spark.history.ui.acls.enable / spark.acls.enable and check if the value is enabled or disabled. To&amp;nbsp;&lt;SPAN&gt;mitigate this issue you can disable Spark ACLs.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Jul 2022 01:42:23 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/349116#M235530</guid>
      <dc:creator>jagadeesan</dc:creator>
      <dc:date>2022-07-30T01:42:23Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/349273#M235587</link>
      <description>&lt;P&gt;&lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/78359"&gt;@jeromedruais&lt;/a&gt;&amp;nbsp;Has the reply helped resolve your issue? If so, please mark the appropriate reply as the solution, as it will make it easier for others to find the answer in the future. Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 01 Aug 2022 14:58:17 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/349273#M235587</guid>
      <dc:creator>DianaTorres</dc:creator>
      <dc:date>2022-08-01T14:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/351439#M236259</link>
      <description>&lt;P&gt;Thanks for this answer I haven't seen before today.&lt;BR /&gt;Does the community should provide a fix for Spark 2 versions ?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 15:14:39 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/351439#M236259</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2022-09-02T15:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/352725#M236584</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;parameters you mentioned do not appear in Ambari.&lt;BR /&gt;Does that mean our clusters are running with the default settings, exposing the clusters to the vulnerability ?&lt;BR /&gt;Please, could you provide the way to set this parameters (which custom settings for Spark 1 and Spark 2 as well as the keys and values).&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Thanks in advance.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 12:51:26 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/352725#M236584</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2022-09-20T12:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-33891</title>
      <link>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/353318#M236687</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/67146"&gt;@jagadeesan&lt;/a&gt;&amp;nbsp;, &lt;a href="https://community.cloudera.com/t5/user/viewprofilepage/user-id/80393"&gt;@rki_&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;parameters you mentioned do not appear in Ambari.&lt;BR /&gt;Does that mean our clusters are running with the default settings, exposing the clusters to the vulnerability ?&lt;BR /&gt;Please, could you provide the way to set this parameters (which custom settings for Spark 1 and Spark 2 as well as the keys and values).&lt;BR /&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 13:57:08 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/CVE-2022-33891/m-p/353318#M236687</guid>
      <dc:creator>jeromedruais</dc:creator>
      <dc:date>2022-09-26T13:57:08Z</dc:date>
    </item>
  </channel>
</rss>

