Safety vulnerability ID: 55199
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Distributed 2021.10.0 includes a fix for CVE-2021-42343: Single machine Dask clusters started with dask.distributed.LocalCluster or dask.distributed.Client (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhst. A Dask cluster created using this method (when running on a machine that has an applicable port exposed) could be used by a sophisticated attacker to achieve remote code execution.
Latest version: 2024.11.2
Distributed scheduler for Dask
This vulnerability has no description
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application