UNCLASSIFIED - NO CUI

Skip to content

chore(findings): opensource/apache/jmxtrans

Summary

opensource/apache/jmxtrans has 90 new findings discovered during continuous monitoring.

id source severity package
e07d84b039b0e6fcea42fbda1d378647 Anchore Compliance Critical
698044205a9c4a6d48b7937e66a6bf4f Anchore Compliance Low
320a97c6816565eedf3545833df99dd0 Anchore Compliance Low
e7573262736ef52353cde3bae2617782 Anchore Compliance Low
addbb93c22e9b0988b8b40392a4538cb Anchore Compliance Low
3e5fad1c039f3ecfd1dcdc94d2f1f9a0 Anchore Compliance Low
abb121e9621abdd452f65844954cf1c1 Anchore Compliance Low
34de21e516c0ca50a96e5386f163f8bf Anchore Compliance Low
b18c88ddeab24abfb92ae2ccddb0b022 Anchore Compliance Critical
CVE-2023-4421 Anchore CVE Medium nss-util-3.90.0-3.el9_2
CVE-2023-4421 Anchore CVE Medium nss-sysinit-3.90.0-3.el9_2
CVE-2023-5388 Anchore CVE Medium nss-util-3.90.0-3.el9_2
CVE-2023-5388 Anchore CVE Medium nss-softokn-3.90.0-3.el9_2
CVE-2023-4421 Anchore CVE Medium nss-softokn-freebl-3.90.0-3.el9_2
CVE-2023-5388 Anchore CVE Medium nss-sysinit-3.90.0-3.el9_2
CVE-2023-4421 Anchore CVE Medium nspr-4.35.0-3.el9_2
CVE-2023-4421 Anchore CVE Medium nss-softokn-3.90.0-3.el9_2
CVE-2023-5388 Anchore CVE Medium nspr-4.35.0-3.el9_2
CVE-2023-4421 Anchore CVE Medium nss-3.90.0-3.el9_2
CVE-2023-5388 Anchore CVE Medium nss-3.90.0-3.el9_2
CVE-2023-0833 Anchore CVE Medium okhttp-3.8.1
CVE-2023-5388 Anchore CVE Medium nss-softokn-freebl-3.90.0-3.el9_2
CVE-2021-35939 Anchore CVE Medium rpm-build-libs-4.16.1.3-25.el9
CVE-2021-35938 Anchore CVE Medium python3-rpm-4.16.1.3-25.el9
CVE-2023-2975 Anchore CVE Low openssl-1:3.0.7-24.el9
CVE-2021-35939 Anchore CVE Medium python3-rpm-4.16.1.3-25.el9
CVE-2023-38470 Anchore CVE Medium avahi-libs-0.8-15.el9
CVE-2021-23840 Anchore CVE Medium openssl-1:3.0.7-24.el9
CVE-2021-35937 Anchore CVE Medium rpm-build-libs-4.16.1.3-25.el9
CVE-2021-35939 Anchore CVE Medium rpm-sign-libs-4.16.1.3-25.el9
CVE-2021-35938 Anchore CVE Medium rpm-build-libs-4.16.1.3-25.el9
CVE-2023-38469 Anchore CVE Medium avahi-libs-0.8-15.el9
CVE-2023-4039 Anchore CVE Medium libgomp-11.4.1-2.1.el9
CVE-2023-3446 Anchore CVE Low openssl-1:3.0.7-24.el9
CVE-2023-3817 Anchore CVE Low openssl-1:3.0.7-24.el9
CVE-2023-38471 Anchore CVE Medium avahi-libs-0.8-15.el9
CVE-2021-35937 Anchore CVE Medium rpm-sign-libs-4.16.1.3-25.el9
CVE-2021-35938 Anchore CVE Medium rpm-sign-libs-4.16.1.3-25.el9
CVE-2021-35937 Anchore CVE Medium python3-rpm-4.16.1.3-25.el9
CVE-2023-5363 Anchore CVE Medium openssl-1:3.0.7-24.el9
CVE-2023-38472 Anchore CVE Medium avahi-libs-0.8-15.el9
CVE-2023-38473 Anchore CVE Medium avahi-libs-0.8-15.el9
CVE-2023-5678 Anchore CVE Low openssl-1:3.0.7-24.el9
GHSA-5r5r-6hpj-8gg9 Anchore CVE High jackson-databind-2.9.9.3
CVE-2023-48161 Anchore CVE Medium java-11-openjdk-headless-1:11.0.21.0.9-2.el9
CVE-2021-3997 Anchore CVE Medium systemd-pam-252-18.el9
CVE-2021-35938 Anchore CVE Medium rpm-plugin-systemd-inhibit-4.16.1.3-25.el9
CVE-2023-29383 Anchore CVE Medium libfdisk-2.37.4-15.el9
CVE-2023-29383 Anchore CVE Medium util-linux-2.37.4-15.el9
CVE-2021-3997 Anchore CVE Medium systemd-rpm-macros-252-18.el9
CVE-2021-35939 Anchore CVE Medium rpm-plugin-systemd-inhibit-4.16.1.3-25.el9
CVE-2023-30078 Anchore CVE High libeconf-0.4.1-3.el9_2
CVE-2021-35937 Anchore CVE Medium rpm-plugin-systemd-inhibit-4.16.1.3-25.el9
CVE-2023-29383 Anchore CVE Medium util-linux-core-2.37.4-15.el9
CVE-2021-3997 Anchore CVE Medium systemd-252-18.el9
GHSA-vmq6-5m68-f53m Anchore CVE High logback-core-1.2.3
GHSA-vmq6-5m68-f53m Anchore CVE High logback-classic-1.2.3
CCE-88048-4 OSCAP Compliance Medium
CCE-83463-0 OSCAP Compliance High
CCE-83641-1 OSCAP Compliance Low
CCE-83566-0 OSCAP Compliance Medium
CCE-88413-0 OSCAP Compliance Medium
CCE-83564-5 OSCAP Compliance Medium
CCE-86356-3 OSCAP Compliance Medium
CCE-83570-2 OSCAP Compliance Medium
CCE-83575-1 OSCAP Compliance Medium
CCE-83567-8 OSCAP Compliance Medium
CCE-83563-7 OSCAP Compliance Medium
CCE-83579-3 OSCAP Compliance Medium
CCE-83565-2 OSCAP Compliance Medium
CCE-86354-8 OSCAP Compliance Medium
CCE-89176-2 OSCAP Compliance Medium
CCE-83568-6 OSCAP Compliance Medium
CCE-83587-6 OSCAP Compliance Medium
CCE-83589-2 OSCAP Compliance Medium
CCE-86068-4 OSCAP Compliance Medium
CCE-83583-5 OSCAP Compliance Medium
CCE-83588-4 OSCAP Compliance Medium
CCE-83984-5 OSCAP Compliance Medium
CCE-83979-5 OSCAP Compliance Medium
CCE-90308-8 OSCAP Compliance High
CCE-83980-3 OSCAP Compliance Medium
CCE-83560-3 OSCAP Compliance Low
CCE-90085-2 OSCAP Compliance Medium
CVE-2023-0833 Twistlock CVE Medium com.squareup.okhttp3_okhttp-3.8.1
CVE-2023-44487 Twistlock CVE High io.netty_netty-codec-4.1.12
CVE-2018-20200 Twistlock CVE Medium com.squareup.okhttp3_okhttp-3.8.1
CVE-2023-35116 Twistlock CVE Medium com.fasterxml.jackson.core_jackson-databind-2.9.9.3
CVE-2023-6378 Twistlock CVE High ch.qos.logback_logback-core-1.2.3
CVE-2023-6378 Twistlock CVE High ch.qos.logback_logback-classic-1.2.3

VAT: https://vat.dso.mil/vat/image?imageName=opensource/apache/jmxtrans&tag=0.20.1-ubi9&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/apache/jmxtrans&tag=0.20.1-ubi9&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information