Hi Joshua,

It may take a lot of effort and knowledge to review whether CVEs are
exploitable or not.
I have seen this kind of analysis done in a few cases, such as SnakeYAML
recently: https://s.apache.org/beam-and-cve-2022-1471 (
https://github.com/apache/beam/issues/25449)

If there is a patch available, I believe we should err on the side of
caution and update them (if possible).

For the example that you mentioned, there is some work started by Alexey
Romanenko to remove/decouple Avro from Beam core, so we can upgrade to
newer versions: https://github.com/apache/beam/issues/25252.
Another recent progress is Beam releasing a new version of its vendored
gRPC to move past some CVEs originated from protobuf-java:
https://github.com/apache/beam/issues/25746


Is there any other particular dependency that you are concerned about?
Please consider filing an issue at https://github.com/apache/beam/issues so
we can start tracking it.


Best,
Bruno



On Mon, May 1, 2023 at 5:28 PM Brule, Joshua L. (Josh), CISSP via user <
user@beam.apache.org> wrote:

> Hello,
>
>
>
> I am hoping you could help me with our vulnerability remediation process.
> We have several development teams using Apache Beam in their projects. When
> performing our Software Composition Analysis (Third-Party Software) scan,
> projects utilizing Apache Beam have an incredible number of CVEs, Jackson
> Data Mapper being an extreme outlier.
>
>
>
> I Jackson Data Mapper is a transitive dependency via Avro but I am
> wondering. Has the Apache Beam team reviewed these CVEs and found them NOT
> EXPLOITABLE as implemented. Or if exploitable implemented mitigations
> pre/post usage of the library?
>
>
>
> Thank you for your time,
>
> Josh
>
>
>
> *Joshua Brule* | Sr Information Security Engineer
>

Reply via email to