chore(findings): opensource/apache/nifi-registry
Summary
opensource/apache/nifi-registry has 32 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.13.2.2 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.13.2.2 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.13.4 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.19.4 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.13.4 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.20.1 |
CVE-2022-39260 | Twistlock CVE | Medium | git-core-2.31.1-2.el8 |
CVE-2022-39253 | Twistlock CVE | Medium | git-core-2.31.1-2.el8 |
GHSA-5hc5-c3m9-8vcj | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-fv22-xp26-mm9w | Anchore CVE | High | woodstox-core-6.3.1 |
GHSA-5hc5-c3m9-8vcj | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-9fwf-46g9-45rx | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-fv22-xp26-mm9w | Anchore CVE | High | woodstox-core-6.3.1 |
GHSA-4rv7-wj6m-6c6r | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-4rv7-wj6m-6c6r | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-9fwf-46g9-45rx | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Low | woodstox-core-6.3.1 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Low | woodstox-core-6.3.1 |
CVE-2022-39260 | Anchore CVE | Medium | git-core-2.31.1-2.el8 |
CVE-2022-42004 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.13.2.2 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.13.2.2 |
CVE-2022-42003 | Twistlock CVE | High | com.fasterxml.jackson.core_jackson-databind-2.13.4 |
CVE-2022-40153 | Twistlock CVE | High | com.fasterxml.woodstox_woodstox-core-6.3.1 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-4.1.76 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.20.1 |
CVE-2022-3171 | Twistlock CVE | Medium | com.google.protobuf_protobuf-java-3.19.4 |
CVE-2022-24823 | Twistlock CVE | Medium | io.netty_netty-codec-http-4.1.76 |
CVE-2022-40156 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.3.1 |
CVE-2022-40155 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.3.1 |
CVE-2022-40154 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.3.1 |
CVE-2022-40152 | Twistlock CVE | Low | com.fasterxml.woodstox_woodstox-core-6.3.1 |
CVE-2022-39253 | Anchore CVE | Medium | git-core-2.31.1-2.el8 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/apache/nifi-registry&tag=1.18.0&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/opensource/apache/nifi-registry/-/jobs/14561304
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.