Skip to content
This repository was archived by the owner on Oct 15, 2023. It is now read-only.
This repository was archived by the owner on Oct 15, 2023. It is now read-only.

JanusGraph official dockers fail vulnerability scans with alarming number of critical vulnerabilities  #129

@havascolino

Description

@havascolino

The new version 1.0rc1-rc2
have a lower number of vulnerabilities 3-4 in the fallowing jar files
rc1
org.apache.hadoop_hadoop-common version 2.10.2 has 1 vulnerability
org.apache.hadoop_hadoop-common version 3.3.1 has 2 vulnerabilities
com.fasterxml.jackson.core_jackson-databind version 2.4.0 has 1 vulnerability

rc2 has only the last two

the origin of the problem is the fallowing layer
ADD file:18e71f049606f6339ce7a995839623f50e6ec6474bfd0a3a7ca799db726f47f6 in /
which seems to be not upto date

the 6.3 version has 10 vulnerabilities
from the fallowing layer

ENV JANUS_VERSION=0.6.3 JANUS_HOME=/opt/janusgraph JANUS_CONFIG_DIR=/etc/opt/janusgraph JANUS_DATA_DIR=/var/lib/janusgraph JANUS_SERVER_TIMEOUT=30 JANUS_STORAGE_TIMEOUT=60 JANUS_PROPS_TEMPLATE=berkeleyje-lucene JANUS_INITDB_DIR=/docker-entrypoint-initdb.d gremlinserver.graphs.graph=/etc/opt/janusgraph/janusgraph.properties gremlinserver.threadPoolWorker=1 gremlinserver.gremlinPool=8

with these cve

org.apache.hadoop_hadoop-common 2.8.5 CVE-2022-26612 critical
org.apache.hadoop_hadoop-common 2.8.5 CVE-2022-25168 critical
log4j_log4j 1.2.17 CVE-2022-23305 critical
org.apache.hadoop_hadoop-common 2.8.5 CVE-2021-37404 critical
log4j_log4j 1.2.17 CVE-2020-9493 critical
io.netty_netty-all 4.1.34.Final CVE-2019-20445 critical
io.netty_netty-all 4.1.34.Final CVE-2019-20444 critical
log4j_log4j 1.2.17 CVE-2019-17571 critical
com.nimbusds_nimbus-jose-jwt 4.41.1 CVE-2019-17195 critical
com.fasterxml.jackson.core_jackson-databind 2.4.0 CVE-2018-7489 critical
org.apache.hadoop_hadoop-common 2.8.5 [CVE-2022-26612](https://nvd.nist.gov/vuln/detail/CVE-2022-26612) critical org.apache.hadoop_hadoop-common 2.8.5 [CVE-2022-25168](https://nvd.nist.gov/vuln/detail/CVE-2022-25168) critical log4j_log4j 1.2.17 [CVE-2022-23305](https://nvd.nist.gov/vuln/detail/CVE-2022-23305) critical org.apache.hadoop_hadoop-common 2.8.5 [CVE-2021-37404](https://nvd.nist.gov/vuln/detail/CVE-2021-37404) critical log4j_log4j 1.2.17 [CVE-2020-9493](https://nvd.nist.gov/vuln/detail/CVE-2020-9493) critical io.netty_netty-all 4.1.34.Final [CVE-2019-20445](https://nvd.nist.gov/vuln/detail/CVE-2019-20445) critical io.netty_netty-all 4.1.34.Final [CVE-2019-20444](https://nvd.nist.gov/vuln/detail/CVE-2019-20444) critical log4j_log4j 1.2.17 [CVE-2019-17571](https://nvd.nist.gov/vuln/detail/CVE-2019-17571) critical com.nimbusds_nimbus-jose-jwt 4.41.1 [CVE-2019-17195](https://nvd.nist.gov/vuln/detail/CVE-2019-17195) critical com.fasterxml.jackson.core_jackson-databind 2.4.0 [CVE-2018-7489](https://nvd.nist.gov/vuln/detail/CVE-2018-7489) critical

Solving these vulnerabilities at the source could help organizations trying to adopt Janusgraph do so with ease and safety.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions