chore(findings): opensource/spark-operator/spark-py
Summary
opensource/spark-operator/spark-py has 172 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-44487 | Anchore CVE | High | jetty-proxy-9.4.52.v20230823 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlets-9.4.52.v20230823 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-30.1.1-jre |
CVE-2022-0530 | Anchore CVE | Low | unzip-6.0-56.el9 |
CVE-2022-30632 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-29405 | Anchore CVE | Critical | stdlib-go1.17.10 |
CVE-2023-24537 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.3.0 |
CVE-2023-26031 | Anchore CVE | High | hadoop-yarn-common-3.3.4 |
CVE-2023-36478 | Anchore CVE | High | jetty-client-9.4.52.v20230823 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
GHSA-fg2v-w576-w4v3 | Anchore CVE | High | json-smart-1.3.2 |
CVE-2022-27664 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26031 | Anchore CVE | High | hadoop-auth-3.3.4 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.13.4.2 |
CVE-2023-26031 | Anchore CVE | High | hadoop-common-3.3.4 |
CVE-2023-26031 | Anchore CVE | High | hadoop-yarn-api-3.3.4 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-ajax-9.4.43.v20210629 |
GHSA-55g7-9cwv-5qfv | Anchore CVE | High | snappy-java-1.1.10.3 |
CVE-2023-26031 | Anchore CVE | High | hadoop-client-3.3.4 |
CVE-2023-29403 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-39318 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2022-2048 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
CVE-2022-1962 | Anchore CVE | Medium | stdlib-go1.17.10 |
GHSA-xjp4-hw94-mvp5 | Anchore CVE | Medium | commons-configuration2-2.1.1 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2022-41724 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2022-41717 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2022-2047 | Anchore CVE | Low | jetty-client-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-servlet-9.4.52.v20230823 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2022-2048 | Anchore CVE | High | jetty-client-9.4.43.v20210629 |
GHSA-jjjh-jjxp-wpff | Anchore CVE | High | jackson-databind-2.12.7 |
CVE-2023-35116 | Anchore CVE | Medium | jackson-databind-2.12.7 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-9.4.52.v20230823 |
CVE-2023-44487 | Anchore CVE | High | jetty-client-9.4.52.v20230823 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.3.0 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-client-9.4.43.v20210629 |
GHSA-58qw-p7qm-5rvh | Anchore CVE | Low | jetty-xml-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-9.4.52.v20230823 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-client-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlets-9.4.52.v20230823 |
GHSA-77rm-9x9h-xj3g | Anchore CVE | High | protobuf-java-3.7.1 |
CVE-2022-1705 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2022-2048 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
GHSA-hmr7-m48g-48f6 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
CVE-2022-2879 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-9.4.52.v20230823 |
CVE-2023-24539 | Anchore CVE | High | stdlib-go1.17.10 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.3.0 |
CVE-2023-45803 | Anchore CVE | Medium | python3-pip-21.2.3-8.el9 |
CVE-2023-29400 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-webapp-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-39319 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-client-9.4.43.v20210629 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-30.1.1-jre |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-14.0.1 |
CVE-2023-36478 | Anchore CVE | High | jetty-continuation-9.4.52.v20230823 |
GHSA-4265-ccf5-phj5 | Anchore CVE | High | commons-compress-1.21 |
CVE-2023-45287 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26031 | Anchore CVE | High | hadoop-annotations-3.3.4 |
CVE-2023-24534 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-xml-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-9.4.52.v20230823 |
CVE-2023-36478 | Anchore CVE | High | jetty-security-9.4.52.v20230823 |
CVE-2023-24540 | Anchore CVE | Critical | stdlib-go1.17.10 |
CVE-2023-24538 | Anchore CVE | Critical | stdlib-go1.17.10 |
CVE-2022-30629 | Anchore CVE | Low | stdlib-go1.17.10 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-9.4.52.v20230823 |
CVE-2023-39326 | Anchore CVE | Medium | stdlib-go1.17.10 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-3.7.1 |
CVE-2023-36478 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-continuation-9.4.52.v20230823 |
CVE-2023-44487 | Anchore CVE | High | jetty-http-9.4.52.v20230823 |
GHSA-mvr2-9pj6-7w5j | Anchore CVE | Medium | guava-14.0.1 |
CVE-2023-36478 | Anchore CVE | High | jetty-util-9.4.43.v20210629 |
GHSA-h4h5-3hr4-j3g2 | Anchore CVE | Medium | protobuf-java-3.7.1 |
CVE-2022-41725 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-44487 | Anchore CVE | High | jetty-servlet-9.4.52.v20230823 |
CVE-2023-44487 | Anchore CVE | High | jetty-plus-9.4.52.v20230823 |
CVE-2022-30580 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2023-26031 | Anchore CVE | High | hadoop-hdfs-client-3.3.4 |
GHSA-rhrv-645h-fjfh | Anchore CVE | High | avro-1.7.7 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2022-30631 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26031 | Anchore CVE | High | hadoop-yarn-client-3.3.4 |
CVE-2022-28131 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2022-0529 | Anchore CVE | Low | unzip-6.0-56.el9 |
CVE-2022-30633 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-client-9.4.43.v20210629 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-client-9.4.43.v20210629 |
CVE-2022-30635 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-44487 | Anchore CVE | High | jetty-io-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-proxy-9.4.52.v20230823 |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-3.7.1 |
CVE-2023-29404 | Anchore CVE | Critical | stdlib-go1.17.10 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-util-9.4.43.v20210629 |
CVE-2022-41723 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2022-41715 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-client-9.4.43.v20210629 |
CVE-2023-26031 | Anchore CVE | High | hadoop-mapreduce-client-common-3.3.4 |
CVE-2022-2048 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
CVE-2023-41900 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-29409 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2022-46751 | Anchore CVE | High | ivy-2.5.1 |
CVE-2023-26031 | Anchore CVE | High | hadoop-mapreduce-client-jobclient-3.3.4 |
GHSA-g5ww-5jh7-63cx | Anchore CVE | High | protobuf-java-3.3.0 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-io-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-plus-9.4.52.v20230823 |
CVE-2022-2048 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-xml-9.4.43.v20210629 |
GHSA-4gg5-vx3j-xwc7 | Anchore CVE | High | protobuf-java-3.3.0 |
CVE-2023-45285 | Anchore CVE | High | stdlib-go1.17.10 |
GHSA-cgp8-4m63-fhh5 | Anchore CVE | Medium | commons-net-3.6 |
CVE-2023-36479 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2023-45803 | Twistlock CVE | Medium | python3-pip-21.2.3-8.el9 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-3.7.1 |
CVE-2022-2880 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2022-32148 | Anchore CVE | Medium | stdlib-go1.17.10 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-http-9.4.43.v20210629 |
CVE-2023-24532 | Anchore CVE | Medium | stdlib-go1.17.10 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-1.3.2 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-security-9.4.52.v20230823 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-client-9.4.43.v20210629 |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-14.0.1 |
GHSA-cj7v-27pg-wf7q | Anchore CVE | Low | jetty-http-9.4.43.v20210629 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
CVE-2022-2047 | Anchore CVE | Low | jetty-io-9.4.43.v20210629 |
CVE-2022-30630 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-44487 | Anchore CVE | High | jetty-server-9.4.52.v20230823 |
CVE-2023-39323 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-26049 | Anchore CVE | Medium | jetty-webapp-9.4.43.v20210629 |
GHSA-9w38-p64v-xpmv | Anchore CVE | Medium | commons-configuration2-2.1.1 |
GHSA-gvpg-vgmx-xg6w | Anchore CVE | Medium | nimbus-jose-jwt-9.8.1 |
GHSA-wrvw-hg22-4m67 | Anchore CVE | High | protobuf-java-3.3.0 |
CVE-2023-26031 | Anchore CVE | High | hadoop-mapreduce-client-core-3.3.4 |
CVE-2023-26048 | Anchore CVE | Medium | jetty-util-ajax-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | jetty-webapp-9.4.43.v20210629 |
CVE-2023-44487 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-40167 | Anchore CVE | Medium | jetty-xml-9.4.43.v20210629 |
GHSA-4g9r-vxhx-9pgx | Anchore CVE | High | commons-compress-1.21 |
CVE-2023-29402 | Anchore CVE | Critical | stdlib-go1.17.10 |
CVE-2022-32189 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-24536 | Anchore CVE | High | stdlib-go1.17.10 |
CVE-2023-36478 | Anchore CVE | High | jetty-http-9.4.43.v20210629 |
CVE-2023-36478 | Anchore CVE | High | jetty-server-9.4.52.v20230823 |
GHSA-rgv9-q543-rqg4 | Anchore CVE | High | jackson-databind-2.12.7 |
CVE-2023-44487 | Anchore CVE | High | jetty-util-ajax-9.4.43.v20210629 |
CVE-2023-29406 | Anchore CVE | Medium | stdlib-go1.17.10 |
GHSA-7g45-4rm6-3mm3 | Anchore CVE | Medium | guava-30.1.1-jre |
GHSA-5mg8-w23w-74h3 | Anchore CVE | Low | guava-30.1.1-jre |
CVE-2022-41722 | Anchore CVE | High | stdlib-go1.17.10 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/spark-operator/spark-py&tag=3.5.1&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/spark-operator/spark-py&tag=3.5.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.