UNCLASSIFIED - NO CUI

Skip to content

chore(findings): redhat/openjdk/openjdk17-ubi9

Summary

redhat/openjdk/openjdk17-ubi9 has 2 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=redhat/openjdk/openjdk17-ubi9&tag=1.17&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2021-25317 Twistlock CVE Low cups-1:2.3.3op2-33.el9_6.1 0.00076 false
CVE-2023-4504 Twistlock CVE Medium cups-1:2.3.3op2-33.el9_6.1 0.00036 false

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=redhat/openjdk/openjdk17-ubi9&tag=1.17&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information