chore(findings): confluentinc/cp-ksqldb-server
Summary
confluentinc/cp-ksqldb-server has 33 new findings discovered during continuous monitoring.
| id | source | severity | package |
|---|---|---|---|
| GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.30 |
| GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.26 |
| GHSA-3mc7-4q67-w48m | Anchore CVE | High | snakeyaml-1.30 |
| GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-9w3m-gqgf-c4p9 | Anchore CVE | Medium | snakeyaml-1.26 |
| GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.26 |
| GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-c4r9-r8fh-9vj2 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.26 |
| GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.26 |
| GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-98wm-3w3q-mw94 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-hhhw-99gj-p3c3 | Anchore CVE | Medium | snakeyaml-1.30 |
| GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.13.2.2 |
| GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.13.2.2 |
| GHSA-599f-7c49-w659 | Anchore CVE | Critical | commons-text-1.8 |
| CCE-80783-4 | OSCAP Compliance | Medium | |
| CVE-2022-2048 | Twistlock CVE | High | org.eclipse.jetty_jetty-io-9.4.44 |
| CVE-2022-40153 | Twistlock CVE | High | com.fasterxml.woodstox_woodstox-core-6.2.7 |
| CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-all-4.1.73 |
| CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.73 |
| CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.19.4 |
| CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.73 |
| CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.72 |
| CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-io-9.4.44 |
| CVE-2022-40156 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.2.7 |
| CVE-2022-40155 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.2.7 |
| CVE-2022-40154 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.2.7 |
| CVE-2022-40152 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.2.7 |
| CVE-2022-2047 | Twistlock CVE | Low | org.eclipse.jetty_jetty-http-9.4.44 |
| CVE-2022-37454 | Twistlock CVE | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
VAT: https://vat.dso.mil/vat/image?imageName=confluentinc/cp-ksqldb-server&tag=6.2.5-1-ubi8&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/confluent/confluentinc/cp-ksqldb-server-6.2.x/-/jobs/14405038
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approvallabel will be removed and the issue will be sent back toOpen. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApprovallabel.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.