Hello,

I am hoping you could help me with our vulnerability remediation process. We 
have several development teams using Apache Beam in their projects. When 
performing our Software Composition Analysis (Third-Party Software) scan, 
projects utilizing Apache Beam have an incredible number of CVEs, Jackson Data 
Mapper being an extreme outlier.

I Jackson Data Mapper is a transitive dependency via Avro but I am wondering. 
Has the Apache Beam team reviewed these CVEs and found them NOT EXPLOITABLE as 
implemented. Or if exploitable implemented mitigations pre/post usage of the 
library?

Thank you for your time,
Josh

Joshua Brule | Sr Information Security Engineer

Reply via email to