[
https://issues.apache.org/jira/browse/BEAM-12679?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17401306#comment-17401306
]
Luke Cwik edited comment on BEAM-12679 at 8/18/21, 6:59 PM:
------------------------------------------------------------
Your right, it seems as though we have vendored calcite 1.26.0 but have yet to
use it since we still point to 1.20.0 here:
https://github.com/apache/beam/blob/410ad7699621e28433d81809f6b9c42fe7bd6a60/buildSrc/src/main/groovy/org/apache/beam/gradle/BeamModulePlugin.groovy#L665
It looks like https://issues.apache.org/jira/browse/BEAM-9379 wasn't finished.
was (Author: lcwik):
Your right, it seems as though we have vendored calcite 1.26.0 but have yet to
use it since we still point to 1.20.0 here:
https://github.com/apache/beam/blob/410ad7699621e28433d81809f6b9c42fe7bd6a60/buildSrc/src/main/groovy/org/apache/beam/gradle/BeamModulePlugin.groovy#L665
> Critical issues are being pulled in by 2 of Beams dependencies
> --------------------------------------------------------------
>
> Key: BEAM-12679
> URL: https://issues.apache.org/jira/browse/BEAM-12679
> Project: Beam
> Issue Type: Bug
> Components: dependencies
> Reporter: Joel Cain
> Priority: P2
>
> Vulnerabilities are being detected by scans of images using Twistlock
> security service.
> Vulnerabilities:
> 1. org.apache.logging.log4j_log4j-api version 2.6.2 has 2 vulnerabilities (1
> critical)
>
> Main issue description: In Apache Log4j 2.x before 2.8.2, when using the TCP
> socket server or UDP socket server to receive serialized log events from
> another application, a specially crafted binary payload can be sent that,
> when deserialized, can execute arbitrary code.
>
> This issue is fixed in version 2.8.2
>
> 2. com.fasterxml.jackson.core_jackson-databind version 2.9.8 has 49
> vulnerabilities (14 critical)
>
> Example issue description: A flaw was discovered in FasterXML
> jackson-databind in all versions before 2.9.10 and 2.10.0, where it would
> permit polymorphic deserialization of malicious objects using the xalan JNDI
> gadget when used in conjunction with polymorphic type handling methods such
> as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or
> `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might
> instantiate objects from unsafe sources. An attacker could use this flaw to
> execute arbitrary code.
>
> All issues resolved in versions starting 2.9.10.4
--
This message was sent by Atlassian Jira
(v8.3.4#803005)