UNCLASSIFIED - NO CUI

chore(findings): opensource/debezium

Summary

opensource/debezium has 194 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/debezium&tag=2.1.4.Final&branch=master

id source severity package impact workaround
GHSA-3vqj-43w4-2q58 Anchore CVE High json-20211205
CVE-2022-33684 Anchore CVE High pulsar-client-api-2.10.1
GHSA-mjmj-j48q-9wg2 Anchore CVE High snakeyaml-1.33
CVE-2023-31007 Anchore CVE Medium pulsar-client-api-2.10.1
GHSA-cgwf-w82q-5jrr Anchore CVE Medium commons-compress-1.22
GHSA-6mjq-h674-j845 Anchore CVE Medium netty-handler-4.1.86.Final
CVE-2023-30429 Anchore CVE High pulsar-client-api-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-client-api-2.10.1
GHSA-5mg8-w23w-74h3 Anchore CVE Low guava-31.1-jre
CVE-2023-31007 Anchore CVE Medium pulsar-client-admin-api-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-client-admin-api-2.10.1
CVE-2020-7768 Anchore CVE Critical grpc-google-cloud-pubsublite-v1-1.4.12
GHSA-jgvc-jfgh-rjvv Anchore CVE Medium jose4j-0.7.9
GHSA-mjmq-gwgm-5qhm Anchore CVE Medium sshd-common-2.9.2
GHSA-rhrv-645h-fjfh Anchore CVE High avro-1.11.1
GHSA-7g45-4rm6-3mm3 Anchore CVE Medium guava-31.1-jre
CVE-2022-33684 Anchore CVE High pulsar-client-admin-api-2.10.1
CVE-2023-30429 Anchore CVE High pulsar-client-admin-api-2.10.1
GHSA-4f4r-wgv2-jjvg Anchore CVE High quarkus-vertx-http-2.16.3.Final
CVE-2023-30428 Anchore CVE High pulsar-client-admin-api-2.10.1
CVE-2023-33953 Anchore CVE High grpc-google-cloud-pubsublite-v1-1.4.12
GHSA-xpw8-rcwv-8f8p Anchore CVE High netty-codec-http2-4.1.86.Final
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.14.2
CVE-2023-32732 Anchore CVE Medium grpc-google-cloud-pubsublite-v1-1.4.12
CVE-2023-30428 Anchore CVE High pulsar-client-api-2.10.1
GHSA-3fhx-3vvg-2j84 Anchore CVE Medium quarkus-core-2.16.3.Final
GHSA-53jx-vvf9-4x38 Anchore CVE Medium vertx-web-4.3.7
GHSA-7g24-qg88-p43q Anchore CVE High jose4j-0.7.9
CVE-2023-44487 Anchore CVE High grpc-google-cloud-pubsublite-v1-1.4.12
GHSA-4jq9-2xhw-jpx7 Anchore CVE High json-20211205
CVE-2023-37544 Anchore CVE High pulsar-client-admin-api-2.10.1
CVE-2023-48795 Anchore CVE Medium sshd-common-2.9.2
CVE-2023-37544 Anchore CVE High pulsar-client-api-2.10.1
CVE-2023-51437 Anchore CVE High pulsar-client-admin-api-2.10.1
CVE-2023-51437 Anchore CVE High pulsar-client-api-2.10.1
GHSA-4265-ccf5-phj5 Anchore CVE Medium commons-compress-1.22
GHSA-4g9r-vxhx-9pgx Anchore CVE High commons-compress-1.22
GHSA-6qvw-249j-h44c Anchore CVE Medium jose4j-0.7.9
GHSA-5jpm-x58v-624v Anchore CVE Medium netty-codec-http-4.1.86.Final
GHSA-9ph3-v2vh-3qx7 Anchore CVE Medium vertx-core-4.3.7
GHSA-f8h5-v2vg-46rr Anchore CVE High quarkus-core-2.16.3.Final
GHSA-5jpm-x58v-624v Anchore CVE Medium netty-codec-http-4.1.77.Final
GHSA-rgv9-q543-rqg4 Anchore CVE High jackson-databind-2.13.2.1
GHSA-5mg8-w23w-74h3 Anchore CVE Low guava-31.0.1-jre
GHSA-pqr6-cmr2-h8hf Anchore CVE Medium snappy-java-1.1.8.4
CVE-2023-31007 Anchore CVE Medium pulsar-common-2.10.1
CVE-2023-37544 Anchore CVE High pulsar-transaction-common-2.10.1
GHSA-qcwq-55hx-v3vh Anchore CVE High snappy-java-1.1.8.4
CVE-2023-37544 Anchore CVE High pulsar-common-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-transaction-common-2.10.1
CVE-2023-39410 Anchore CVE High avro-protobuf-1.10.2
GHSA-jjjh-jjxp-wpff Anchore CVE High jackson-databind-2.13.2.1
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-fx2c-96vj-985v Anchore CVE Medium netty-codec-haproxy-4.1.77.Final
GHSA-w37g-rhq8-7m4j Anchore CVE Medium snakeyaml-1.30
GHSA-mjmj-j48q-9wg2 Anchore CVE High snakeyaml-1.30
CVE-2023-30428 Anchore CVE High pulsar-common-2.10.1
GHSA-98wm-3w3q-mw94 Anchore CVE Medium snakeyaml-1.30
CVE-2023-51437 Anchore CVE High pulsar-common-2.10.1
GHSA-hhhw-99gj-p3c3 Anchore CVE Medium snakeyaml-1.30
CVE-2023-30428 Anchore CVE High pulsar-transaction-common-2.10.1
GHSA-7g45-4rm6-3mm3 Anchore CVE Medium guava-31.0.1-jre
GHSA-6mjq-h674-j845 Anchore CVE Medium netty-handler-4.1.77.Final
CVE-2022-32531 Anchore CVE Medium bookkeeper-common-allocator-4.14.5
CVE-2022-33684 Anchore CVE High pulsar-transaction-common-2.10.1
GHSA-wjxj-5m7g-mg7q Anchore CVE Medium bcprov-ext-jdk15on-1.69
GHSA-wjxj-5m7g-mg7q Anchore CVE Medium bcprov-ext-jdk15on-1.69
CVE-2023-31007 Anchore CVE Medium pulsar-transaction-common-2.10.1
GHSA-55g7-9cwv-5qfv Anchore CVE High snappy-java-1.1.8.4
CVE-2022-33684 Anchore CVE High pulsar-common-2.10.1
CVE-2023-35116 Anchore CVE Medium jackson-databind-2.13.2.1
GHSA-24rp-q3w6-vc56 Anchore CVE Critical postgresql-42.5.1
CVE-2023-37579 Anchore CVE Medium pulsar-common-2.10.1
GHSA-rhrv-645h-fjfh Anchore CVE High avro-1.10.2
GHSA-fjpj-2g6w-x25r Anchore CVE Medium snappy-java-1.1.8.4
GHSA-3mc7-4q67-w48m Anchore CVE High snakeyaml-1.30
CVE-2023-51437 Anchore CVE High pulsar-transaction-common-2.10.1
CVE-2023-30429 Anchore CVE High pulsar-transaction-common-2.10.1
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-ext-jdk15on-1.69
CVE-2023-30429 Anchore CVE High pulsar-common-2.10.1
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-ext-jdk15on-1.69
GHSA-4g9r-vxhx-9pgx Anchore CVE High commons-compress-1.21
GHSA-9w3m-gqgf-c4p9 Anchore CVE Medium snakeyaml-1.30
GHSA-4265-ccf5-phj5 Anchore CVE Medium commons-compress-1.21
GHSA-wjxj-5m7g-mg7q Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-hr8g-6v94-x4m9 Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-c4r9-r8fh-9vj2 Anchore CVE Medium snakeyaml-1.30
CVE-2024-1597 Twistlock CVE Critical org.postgresql_postgresql-42.5.1
CVE-2022-1471 Twistlock CVE Critical org.yaml_snakeyaml-1.30
CVE-2022-1471 Twistlock CVE Critical org.yaml_snakeyaml-1.33
CVE-2024-25710 Twistlock CVE Medium org.apache.commons_commons-compress-1.22
CVE-2024-25710 Twistlock CVE Medium org.apache.commons_commons-compress-1.21
CVE-2023-4853 Twistlock CVE High io.quarkus_quarkus-vertx-http-2.16.3.Final
GHSA-xpw8-rcwv-8f8p Twistlock CVE High io.netty_netty-codec-http2-4.1.86.Final
CVE-2024-26308 Twistlock CVE Medium org.apache.commons_commons-compress-1.21
CVE-2024-26308 Twistlock CVE Medium org.apache.commons_commons-compress-1.22
CVE-2023-5072 Twistlock CVE High org.json_json-20211205
CVE-2023-43642 Twistlock CVE High org.xerial.snappy_snappy-java-1.1.8.4
CVE-2023-39410 Twistlock CVE High org.apache.avro_avro-1.11.1
CVE-2023-39410 Twistlock CVE High org.apache.avro_avro-1.10.2
CVE-2023-34455 Twistlock CVE High org.xerial.snappy_snappy-java-1.1.8.4
CVE-2023-31582 Twistlock CVE High org.bitbucket.b_c_jose4j-0.7.9
CVE-2023-1428 Twistlock CVE High grpc-protobuf-1.51.1
CVE-2022-45688 Twistlock CVE High org.json_json-20211205
CVE-2022-42004 Twistlock CVE High com.fasterxml.jackson.core_jackson-databind-2.13.2.1
CVE-2022-42003 Twistlock CVE High com.fasterxml.jackson.core_jackson-databind-2.13.2.1
CVE-2022-25857 Twistlock CVE High org.yaml_snakeyaml-1.30
CVE-2023-32731 Twistlock CVE High grpc-protobuf-1.51.1
CVE-2023-2976 Twistlock CVE High com.google.guava_guava-31.0.1-jre
CVE-2023-2976 Twistlock CVE High com.google.guava_guava-31.1-jre
CVE-2023-34462 Twistlock CVE Medium io.netty_netty-handler-4.1.77.Final
CVE-2023-34462 Twistlock CVE Medium io.netty_netty-handler-4.1.86.Final
CVE-2023-2974 Twistlock CVE Medium io.quarkus_quarkus-core-2.16.3.Final
CVE-2022-41854 Twistlock CVE Medium org.yaml_snakeyaml-1.30
CVE-2022-38752 Twistlock CVE Medium org.yaml_snakeyaml-1.30
CVE-2022-38751 Twistlock CVE Medium org.yaml_snakeyaml-1.30
CVE-2022-38749 Twistlock CVE Medium org.yaml_snakeyaml-1.30
CVE-2023-34454 Twistlock CVE Medium org.xerial.snappy_snappy-java-1.1.8.4
CVE-2023-34453 Twistlock CVE Medium org.xerial.snappy_snappy-java-1.1.8.4
CVE-2023-42503 Twistlock CVE Medium org.apache.commons_commons-compress-1.22
CVE-2022-38750 Twistlock CVE Medium org.yaml_snakeyaml-1.30
CVE-2023-32732 Twistlock CVE Medium grpc-protobuf-1.51.1
CVE-2022-41881 Twistlock CVE Medium io.netty_netty-codec-haproxy-4.1.77.Final
CVE-2023-35887 Twistlock CVE Medium org.apache.sshd_sshd-common-2.9.2
CVE-2023-24815 Twistlock CVE Medium io.vertx_vertx-web-4.3.7
GHSA-jgvc-jfgh-rjvv Twistlock CVE Medium org.bitbucket.b_c_jose4j-0.7.9
CVE-2020-8908 Twistlock CVE Low com.google.guava_guava-31.0.1-jre
CVE-2020-8908 Twistlock CVE Low com.google.guava_guava-31.1-jre
CVE-2023-51775 Twistlock CVE Medium org.bitbucket.b_c_jose4j-0.7.9
CVE-2024-29025 Twistlock CVE Medium io.netty_netty-codec-http-4.1.86.Final
CVE-2024-29025 Twistlock CVE Medium io.netty_netty-codec-http-4.1.77.Final
CVE-2024-1300 Twistlock CVE Medium io.vertx_vertx-core-4.3.7
CVE-2024-2700 Twistlock CVE High io.quarkus_quarkus-core-2.16.3.Final
PRISMA-2023-0067 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.14.2
PRISMA-2023-0067 Twistlock CVE High com.fasterxml.jackson.core_jackson-core-2.13.2
CVE-2023-44487 Twistlock CVE High io.netty_netty-codec-http2-4.1.86.Final
CVE-2024-36114 Twistlock CVE High io.airlift_aircompressor-0.20
GHSA-m44j-cfrm-g8qc Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-973x-65j7-xcf4 Anchore CVE High aircompressor-0.20
GHSA-v435-xc8x-wvr9 Anchore CVE Medium bcprov-jdk15on-1.70
CVE-2024-37168 Anchore CVE Medium grpc-google-cloud-pubsublite-v1-1.4.12
GHSA-m44j-cfrm-g8qc Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk15on-1.69
GHSA-8xfc-gm6g-vgpv Anchore CVE Medium bcprov-jdk15on-1.70
GHSA-2326-hx7g-3m9r Anchore CVE High sshd-common-2.9.2
CVE-2023-30428 Anchore CVE High pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-37544 Anchore CVE High pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-30429 Anchore CVE High pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-31007 Anchore CVE Medium pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-51437 Anchore CVE High pulsar-client-messagecrypto-bc-2.10.1
CVE-2022-33684 Anchore CVE High pulsar-client-messagecrypto-bc-2.10.1
CVE-2023-31007 Anchore CVE Medium pulsar-client-original-2.10.1
CVE-2023-30428 Anchore CVE High pulsar-client-original-2.10.1
CVE-2023-37544 Anchore CVE High pulsar-client-original-2.10.1
CVE-2023-44487 Anchore CVE High netty-codec-http2-4.1.86.Final
CVE-2023-30429 Anchore CVE High pulsar-client-2.10.1
CVE-2022-33684 Anchore CVE High pulsar-client-2.10.1
GHSA-m6vm-37g8-gqvh Anchore CVE High mysql-connector-j-8.0.32
CVE-2023-51437 Anchore CVE High pulsar-client-original-2.10.1
CVE-2023-30429 Anchore CVE High pulsar-client-original-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-client-2.10.1
CVE-2023-37579 Anchore CVE Medium pulsar-client-original-2.10.1
CVE-2022-33684 Anchore CVE High pulsar-client-original-2.10.1
CVE-2023-31007 Anchore CVE Medium pulsar-client-2.10.1
CVE-2023-51437 Anchore CVE High pulsar-client-2.10.1
CVE-2023-30428 Anchore CVE High pulsar-client-2.10.1
CVE-2023-37544 Anchore CVE High pulsar-client-2.10.1
GHSA-488m-w9fp-5mm2 Anchore CVE Medium protostream-4.5.1.Final
GHSA-gg57-587f-h5v6 Anchore CVE Low infinispan-core-14.0.6.Final
GHSA-735f-pc8j-v9w8 Anchore CVE High protobuf-java-3.21.9
GHSA-gg57-587f-h5v6 Anchore CVE Low infinispan-client-hotrod-14.0.6.Final
GHSA-gg57-587f-h5v6 Anchore CVE Low infinispan-commons-14.0.6.Final
CVE-2024-41909 Twistlock CVE High org.apache.sshd_sshd-common-2.9.2
CVE-2023-2976 Twistlock CVE High guava-31.1.0.jre
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2024-30171 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2023-33202 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2023-33202 Twistlock CVE Medium org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0
CVE-2024-30172 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2024-30172 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2024-29857 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2023-33201 Twistlock CVE Medium org.bouncycastle_bcprov-ext-jdk15on-1.69.00.0
CVE-2023-33201 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.69.0
CVE-2023-33201 Twistlock CVE Medium org.bouncycastle_bcprov-jdk15on-1.70.0
CVE-2020-8908 Twistlock CVE Low guava-31.1.0.jre
CVE-2023-22102 Twistlock CVE High com.mysql_mysql-connector-j-8.0.32
CVE-2024-7254 Twistlock CVE High com.google.protobuf_protobuf-java-3.21.9
CVE-2023-5236 Twistlock CVE Medium org.infinispan.protostream_protostream-4.5.1.Final
CVE-2023-5384 Twistlock CVE Low org.infinispan_infinispan-commons-14.0.6.Final
CVE-2023-5384 Twistlock CVE Low org.infinispan_infinispan-client-hotrod-14.0.6.Final
CVE-2023-5384 Twistlock CVE Low org.infinispan_infinispan-core-14.0.6.Final

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/debezium&tag=2.1.4.Final&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information