Hi Spark Community, I hope you are doing well. We have identified high and critical CVEs related to the jackson-mapper-asl package used in Apache Spark 3.5.5. We would like to understand if there are any official fixes or recommended mitigation steps available for these vulnerabilities.
| CVE ID | Severity | Packages | Package Version | Package Path | |:---------------|:-----------|:-------------------|:------------------|:----------------------------------------------| | CVE-2019-10202 | critical | jackson-mapper-asl | 1.9.13 | /opt/spark/jars/jackson-mapper-asl-1.9.13.jar | | CVE-2019-10172 | high | jackson-mapper-asl | 1.9.13 | /opt/spark/jars/jackson-mapper-asl-1.9.13.jar | Could you please confirm: If a patched version of Spark or a workaround exists to address these vulnerabilities? If there are any plans to remove or replace jackson-mapper-asl in upcoming releases? Looking forward to your response. Best regards, Ejas Ali ________________________________ This message is for the designated recipient only and may contain privileged, proprietary, or otherwise confidential information. If you have received it in error, please notify the sender immediately and delete the original. Any other use of the e-mail by you is prohibited. Where allowed by local law, electronic communications with Accenture and its affiliates, including e-mail and instant messaging (including content), may be scanned by our systems for the purposes of information security, AI-powered support capabilities, and assessment of internal compliance with Accenture policy. Your privacy is important to us. Accenture uses your personal data only in compliance with data protection laws. For further information on how Accenture processes your personal data, please see our privacy statement at https://www.accenture.com/us-en/privacy-policy. ______________________________________________________________________________________ www.accenture.com