Ganesh

You and/or another person in your email were replied to already on the
proper alias which is the security alias.

In any event since we are now also here we will share the same message

Me: We regularly perform such scans as well.  If we confirm we use a
vulnerable library in a way that exposes the vulnerability we act quickly
to resolve.  We generally do not backport to older lines and instead
continually improve the release going forward.  The current release is 1.15
and we are working on 1.16.

Apache Security/Mark: Outdated dependencies are not always security
issues.  A project would only be affected if a dependency was used in such
a way that the affected underlying code is used and the vulnerabilities
were exposed.  We typically get reports sent to us from scanning tools that
looks at dependencies out of context on how they are actually used in the
projects.  As such we reject these reports and suggest you either a) show
how the product is affected by the dependency vulnerabilities, or b) simply
mention this as a normal bug report to that project.  Since dependency
vulnerabilities are quite public, there is no need to use this private
reporting mechanism for them.

Thanks

On Sun, Dec 12, 2021 at 10:08 PM Ganesh, B (Nokia - IN/Bangalore) <
b.gan...@nokia.com> wrote:

> Hi ,
>
>  As part of upgrade from nifi-1.13.2 to nifi-1.14.0  we performed scans on
> nifi 1.14.0 and as a result there are few critical and high vulnerabilities
> .
>
> Critical vulnerabilities
>
> *Vulnerability Id*
>
> *Severity *
>
> *path*
>
> *Fix available  *
>
> *Link *
>
> CVE-2017-7657
>
> Critical
>
> /opt/nifi/lib/jetty-schemas-3.1.jar
>
> None
>
> NVD - CVE-2017-7657 (nist.gov)
> <https://nvd.nist.gov/vuln/detail/CVE-2017-7657>
>
> CVE-2017-7658
>
> Critical
>
> /opt/nifi/lib/jetty-schemas-3.1.jar
>
> None
>
> https://nvd.nist.gov/vuln/detail/CVE-2017-7658
>
> CVE-2019-12415
>
> Critical
>
> /opt/nifi/lib/nifi-nar-utils-1.14.0.jar
>
> None
>
>
> https://anchore.int.net.nokia.com:443/v1/query/vulnerabilities?id=VULNDB-216029
>
>
>
> High Vulnerabilities
>
>
>
> *Vulnerability Id*
>
> *Severity *
>
> *path*
>
> *Fix available  *
>
> *Link *
>
> CVE-2017-7656
>
> High
>
> /opt/nifi/lib/jetty-schemas-3.1.jar
>
> None
>
> https://nvd.nist.gov/vuln/detail/CVE-2009-5045
>
> CVE-2017-9735
>
> High
>
> /opt/nifi/lib/jetty-schemas-3.1.jar
>
> None
>
> https://nvd.nist.gov/vuln/detail/CVE-2017-9735
>
> CVE-2020-27216
>
> High
>
> /opt/nifi/lib/jetty-schemas-3.1.jar
>
> None
>
> https://nvd.nist.gov/vuln/detail/CVE-2020-27216
>
> VULNDB-256815
>
> High
>
> /opt/nifi-toolkit/lib/commons-compress-1.20.jar
>
> None
>
> https://repo1.dso.mil/dsop/opensource/apache/nifi/-/issues/13
>
> VULNDB-257084
>
> High
>
> /opt/nifi-toolkit/lib/commons-compress-1.20.jar
>
> None
>
> https://repo1.dso.mil/dsop/opensource/apache/nifi/-/issues/13
>
>
>
>
>
> One or two vulnerabilities are fixed in 1.15 example CVE-2020-17521 :
> https://issues.apache.org/jira/browse/NIFI-8990.
>
>
>
> Could you please help us the impact and fix version or possibility of
> fixing in 1.14 it self ?
>
>
>
> Thanks & Regards,
>
> Ganesh.B
>
>
>

Reply via email to