Confluent Platform patch release version 7.0.9 contains fixes that resolve vulnerabilities in Confluent owned components and in various dependency versions depended upon by Confluent Platform components.
Security Vulnerabilities
The following vulnerabilities were resolved in this update:
CVE | CVSS | Impacted Component | Upgraded Component |
N/A | 4.4 |
confluent-kafka < 7.0.9 confluent-server < 7.0.9 confluent-security-plugins <7.0.9 |
confluent-kafka:7.0.9 confluent-server:7.0.9 confluent-security-plugins:7.0.9 More information will be provided in CONFSA-2023-01. |
N/A | 5.5 | confluent-schema-registry < 7.0.9 |
confluent-schema-registry:7.0.9. More information will be provided in CONFSA-2023-03. |
N/A | 4.4 | confluent-ksqldb < 7.0.9 |
confluent-ksqldb:7.0.9 More information will be provided in CONFSA-2023-04. |
Resolved hygiene issues related to Open-Source dependencies
The following package upgrades are included in this release version and are made available to enhance the security hygiene of Confluent software, as no exploitable vector was identified for the CVEs present in impacted packages. We have provided the CVE identifier to assist customers with analysis.
CVE | CVSS | Impacted Package Version | Upgraded Package Version |
CVE-2022-40151 | 7.5 | com.fasterxml.woodstox_woodstox-core < 5.4.0 | com.fasterxml.woodstox_woodstox-core:5.4.0 |
CVE-2022-41881 | 7.5 | netty:netty < 4.1.86 | netty:netty:4.1.86 |
CVE-2022-40152 | 7.5 | com.fasterxml.woodstox_woodstox-core < 5.4.0 | com.fasterxml.woodstox_woodstox-core:5.4.0 |
CVE-2022-41854 | 6.5 | org.yaml:snakeyaml<1.32 | org.yaml:snakeyaml:1.33 |
CVE-2022-41915 | 6.5 | netty:netty < 4.1.86 | netty:netty:4.1.86 |