Confluent Platform patch release version 7.1.9 contains fixes that resolve vulnerabilities in Confluent owned components and in various dependency versions depended upon by Confluent Platform components.
This CP patch release version did not include any upgrades related to exploitable security vulnerabilities.
Resolved hygiene issues related to Open-Source dependencies
The following package upgrades are included in this release version and are made available to enhance the security hygiene of Confluent software, as no exploitable vector was identified for the CVEs present in impacted packages. We have provided the CVE identifier to assist customers with analysis.
|CVE||CVSS||Impacted Package Version||Upgraded Package Version|
|9.8||certifi < 2023.07.22||certifi:2023.07.22|
|7.5||io.grpc_grpc-protobuf < 1.53.0||io.grpc_grpc-protobuf:1.53.0|
|CVE-2023-38493||7.5||com.linecorp.armeria:armeria < 1.24.3||com.linecorp.armeria:armeria:1.24.3|
|CVE-2023-2976||7.1||com.google.guava_guava < 32.0.0||com.google.guava_guava:32.0.1|
|CVE-2022-40896||5.5||pygments < 2.15.0||pygments:2.15.0|
|GHSA-jgvc-jfgh-rjvv||NA||org.bitbucket.b_c:jose4j < 0.9.3||org.bitbucket.b_c: jose4j:0.9.3|
|GHSA-jm77-qphf-c4w8||NA||cryptography < 41.0.3||cryptography:41.0.4|
This patch release uses Red Hat Universal Base Image UBI8 8.8-1037