PyPi: Spark-On-K8s

CVE-2024-3651

Transitive

Safety vulnerability ID: 70493

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 07, 2024 Updated at Feb 17, 2025
Scan your Python projects for vulnerabilities →

Advisory

Spark-on-k8s version 0.5.0 has updated its idna dependency from version 3.6 to 3.7 to address the security vulnerability detailed in CVE-2024-3651.

Affected package

spark-on-k8s

Latest version: 0.12.0

A Python package to submit and manage Apache Spark applications on Kubernetes.

Affected versions

Fixed versions

Vulnerability changelog

What's Changed
* feat(docker): add a dockerfile for spark-history server by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/28
* feat(webserver): integrate spark history server by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/29
* feat(helm): add support for spark history deployment in the helm chart by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/30
* security: bump Apache Airflow version to avoid CVE-2024-29735 by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/31
* chore(helm): add `SPARK_ON_K8S_IN_CLUSTER` by default to the webserver pod by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/32
* ci(helm): publish the chart to a github page by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/33
* doc: add instructions to install helm chart from new repo by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/34
* security: update poetry constraints by hussein-awala in https://github.com/hussein-awala/spark-on-k8s/pull/35


**Full Changelog**: https://github.com/hussein-awala/spark-on-k8s/compare/0.4.0...0.5.0

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

HIGH 7.5

CVSS v3 Details

HIGH 7.5
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH