Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-hwqr-f3v9-hwxr: Workers for local Dask clusters mistakenly listened on public interfaces

Versions of distributed earlier than 2021.10.0 had a potential security vulnerability relating to single-machine Dask clusters.

Clusters started with dask.distributed.LocalCluster or dask.distributed.Client() (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method AND running on a machine that has these ports exposed could be used by a sophisticated attacker to enable remote code execution. Users running on machines with standard firewalls in place, or using clusters created via cluster objects other than LocalCluster (e.g. dask_kubernetes.KubeCluster) should not be affected. This vulnerability is documented in CVE-2021-42343, and was fixed in version 2021.10.0 (PR #5427).

ghsa
#vulnerability#mac#git#kubernetes#rce
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-hwqr-f3v9-hwxr

Workers for local Dask clusters mistakenly listened on public interfaces

Moderate severity GitHub Reviewed Published Jul 15, 2022 in dask/distributed • Updated Jul 15, 2022

Vulnerability details Dependabot alerts 0

Package

pip distributed (pip)

Affected versions

>= 0, < 2021.10.0

Patched versions

2021.10.0

Description

Versions of distributed earlier than 2021.10.0 had a potential security vulnerability relating to single-machine Dask clusters.

Clusters started with dask.distributed.LocalCluster or dask.distributed.Client() (which defaults to using LocalCluster) would mistakenly configure their respective Dask workers to listen on external interfaces (typically with a randomly selected high port) rather than only on localhost. A Dask cluster created using this method AND running on a machine that has these ports exposed could be used by a sophisticated attacker to enable remote code execution. Users running on machines with standard firewalls in place, or using clusters created via cluster objects other than LocalCluster (e.g. dask_kubernetes.KubeCluster) should not be affected. This vulnerability is documented in CVE-2021-42343, and was fixed in version 2021.10.0 (PR #5427).

References

  • GHSA-hwqr-f3v9-hwxr
  • https://docs.dask.org/en/latest/changelog.html
  • https://github.com/dask/dask/tags
  • https://github.com/pypa/advisory-database/tree/main/vulns/distributed/PYSEC-2021-871.yaml
  • https://github.com/pypa/advisory-database/tree/main/vulns/distributed/PYSEC-2021-872.yaml

jcrist published the maintainer security advisory

Oct 29, 2021

Severity

Moderate

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-hwqr-f3v9-hwxr

Source code

dask/distributed

Checking history

See something to contribute? Suggest improvements for this vulnerability.

ghsa: Latest News

GHSA-8fh4-942r-jf2g: LibreNMS has a Stored XSS ('Cross-site Scripting') in librenms/includes/html/pages/device/services.inc.php