Skip to content

Conversation

@gatorsmile
Copy link
Member

@gatorsmile gatorsmile commented Apr 30, 2019

What changes were proposed in this pull request?

This reverts commit 6f394a2.

In general, we need to be very cautious about the Jackson upgrade in the patch releases, especially when this upgrade could break the existing behaviors of the external packages or data sources, and generate different results after the upgrade. The external packages and data sources need to change their source code to keep the original behaviors. The upgrade requires more discussions before releasing it, I think.

In the previous PR #22071, we added the following claim in our security doc:

The Rest Submission Server and the MesosClusterDispatcher do not support authentication. You should ensure that all network access to the REST API & MesosClusterDispatcher (port 6066 and 7077 respectively by default) are restricted to hosts that are trusted to submit jobs.

We need to understand whether this Jackson CVE applies to Spark. Before officially releasing it, we need more inputs from all of you. Currently, I would suggest to revert this upgrade from the upcoming 2.4.3 release, which is trying to fix the accidental default Scala version changes in pre-built artifacts.

How was this patch tested?

N/A

@SparkQA
Copy link

SparkQA commented Apr 30, 2019

Test build #105021 has finished for PR 24493 at commit b867208.

  • This patch fails due to an unknown error code, -9.
  • This patch merges cleanly.
  • This patch adds no public classes.

@wangyum
Copy link
Member

wangyum commented Apr 30, 2019

retest this please

@SparkQA
Copy link

SparkQA commented Apr 30, 2019

Test build #105026 has finished for PR 24493 at commit b867208.

  • This patch passes all tests.
  • This patch merges cleanly.
  • This patch adds no public classes.

Copy link
Member

@dongjoon-hyun dongjoon-hyun left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yep. Although I merged that before, I agree the reverting in branch-2.4, too. I thought Spark 2.4.3 will be released on July.

+1, LGTM. Merged to branch-2.4 to unblock 2.4.3 in this week.

dongjoon-hyun pushed a commit that referenced this pull request Apr 30, 2019
…2.9.8

## What changes were proposed in this pull request?

This reverts commit 6f394a2.

In general, we need to be very cautious about the Jackson upgrade in the patch releases, especially when this upgrade could break the existing behaviors of the external packages or data sources, and generate different results after the upgrade. The external packages and data sources need to change their source code to keep the original behaviors. The upgrade requires more discussions before releasing it, I think.

In the previous PR #22071, we turned off `spark.master.rest.enabled` by default and added the following claim in our security doc:
> The Rest Submission Server and the MesosClusterDispatcher do not support authentication.  You should ensure that all network access to the REST API & MesosClusterDispatcher (port 6066 and 7077 respectively by default) are restricted to hosts that are trusted to submit jobs.

We need to understand whether this Jackson CVE applies to Spark. Before officially releasing it, we need more inputs from all of you. Currently, I would suggest to revert this upgrade from the upcoming 2.4.3 release, which is trying to fix the accidental default Scala version changes in pre-built artifacts.

## How was this patch tested?

N/A

Closes #24493 from gatorsmile/revert24418.

Authored-by: gatorsmile <[email protected]>
Signed-off-by: Dongjoon Hyun <[email protected]>
@srowen
Copy link
Member

srowen commented May 1, 2019

@gatorsmile this is all good but you're still saying this is related to spark.master.rest.enabled ; I don't see that it is? just want to make sure we aren't saying this in release notes or something, that there isn't a problem if you disable this.

@gatorsmile
Copy link
Member Author

updated. Thanks!

@aldettinger
Copy link

Hi guys,

Sorry to comment a closed PR, but it seems so much related to SPARK-27932 I opened few days ago.

From what I read, updating the 2.3.x, 2.4.x branches to jackson-databind >= 2.9.8 is not an option.
Do you think there is any chance to upgrade jackson-databind to >= 2.8.11.3 or >= 2.7.9.5 then ?

Many thanks

@srowen
Copy link
Member

srowen commented Jun 7, 2019

The problem here was a behavior change introduced in 2.7.x, so I think we'd have the same issue in anything after 2.6.x

@aldettinger
Copy link

Thanks for feedback @srowen, I will comment in SPARK-27932 that it seems hard to upgrade jackson-databind versions on spark 2.3.x/2.4.x branches.
At the end of the day, those jackson-databind CVEs will come with spark 3 onward.

kai-chi pushed a commit to kai-chi/spark that referenced this pull request Jul 23, 2019
…2.9.8

## What changes were proposed in this pull request?

This reverts commit 6f394a2.

In general, we need to be very cautious about the Jackson upgrade in the patch releases, especially when this upgrade could break the existing behaviors of the external packages or data sources, and generate different results after the upgrade. The external packages and data sources need to change their source code to keep the original behaviors. The upgrade requires more discussions before releasing it, I think.

In the previous PR apache#22071, we turned off `spark.master.rest.enabled` by default and added the following claim in our security doc:
> The Rest Submission Server and the MesosClusterDispatcher do not support authentication.  You should ensure that all network access to the REST API & MesosClusterDispatcher (port 6066 and 7077 respectively by default) are restricted to hosts that are trusted to submit jobs.

We need to understand whether this Jackson CVE applies to Spark. Before officially releasing it, we need more inputs from all of you. Currently, I would suggest to revert this upgrade from the upcoming 2.4.3 release, which is trying to fix the accidental default Scala version changes in pre-built artifacts.

## How was this patch tested?

N/A

Closes apache#24493 from gatorsmile/revert24418.

Authored-by: gatorsmile <[email protected]>
Signed-off-by: Dongjoon Hyun <[email protected]>
kai-chi pushed a commit to kai-chi/spark that referenced this pull request Jul 25, 2019
…2.9.8

## What changes were proposed in this pull request?

This reverts commit 6f394a2.

In general, we need to be very cautious about the Jackson upgrade in the patch releases, especially when this upgrade could break the existing behaviors of the external packages or data sources, and generate different results after the upgrade. The external packages and data sources need to change their source code to keep the original behaviors. The upgrade requires more discussions before releasing it, I think.

In the previous PR apache#22071, we turned off `spark.master.rest.enabled` by default and added the following claim in our security doc:
> The Rest Submission Server and the MesosClusterDispatcher do not support authentication.  You should ensure that all network access to the REST API & MesosClusterDispatcher (port 6066 and 7077 respectively by default) are restricted to hosts that are trusted to submit jobs.

We need to understand whether this Jackson CVE applies to Spark. Before officially releasing it, we need more inputs from all of you. Currently, I would suggest to revert this upgrade from the upcoming 2.4.3 release, which is trying to fix the accidental default Scala version changes in pre-built artifacts.

## How was this patch tested?

N/A

Closes apache#24493 from gatorsmile/revert24418.

Authored-by: gatorsmile <[email protected]>
Signed-off-by: Dongjoon Hyun <[email protected]>
kai-chi pushed a commit to kai-chi/spark that referenced this pull request Aug 1, 2019
…2.9.8

## What changes were proposed in this pull request?

This reverts commit 6f394a2.

In general, we need to be very cautious about the Jackson upgrade in the patch releases, especially when this upgrade could break the existing behaviors of the external packages or data sources, and generate different results after the upgrade. The external packages and data sources need to change their source code to keep the original behaviors. The upgrade requires more discussions before releasing it, I think.

In the previous PR apache#22071, we turned off `spark.master.rest.enabled` by default and added the following claim in our security doc:
> The Rest Submission Server and the MesosClusterDispatcher do not support authentication.  You should ensure that all network access to the REST API & MesosClusterDispatcher (port 6066 and 7077 respectively by default) are restricted to hosts that are trusted to submit jobs.

We need to understand whether this Jackson CVE applies to Spark. Before officially releasing it, we need more inputs from all of you. Currently, I would suggest to revert this upgrade from the upcoming 2.4.3 release, which is trying to fix the accidental default Scala version changes in pre-built artifacts.

## How was this patch tested?

N/A

Closes apache#24493 from gatorsmile/revert24418.

Authored-by: gatorsmile <[email protected]>
Signed-off-by: Dongjoon Hyun <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants