Confluent Platform patch release version 6.0.10 contains fixes that resolve vulnerabilities in Confluent owned components and in various dependency versions depended upon by Confluent Platform components.
Resolved Vulnerabilities
The following vulnerabilities were fixed in this update:
CVE Reference |
CVSS |
Impacted Package |
Remediation |
7.5 |
apache:kafka |
Update to CP 6.0.10 More information is provided at CONFSA-2022-05 |
Resolved hygiene issues related to Open-Source dependencies
The following package upgrades are included in this release version and are made available to enhance the security hygiene of Confluent software, as no exploitable vector was identified for the CVEs present in impacted packages. We have provided the CVE identifier to assist customers with analysis.
CVE |
CVSS |
Impacted Package Version |
Upgraded Package Version |
7.5 |
org.eclipse.jetty:jetty-http < 9.4.47 |
org.eclipse.jetty:jetty-http:9.4.48.v20220622 |
|
7.3 |
com.google.oauth-client:google-oauth-client < 1.33.3 |
com.google.oauth-client:google-oauth-client:1.133.3 |
|
6.5 |
amazon:aws-sdk-java <= 1.12.260 |
amazon:aws-sdk-java:1.12.268 |
|
5.3 |
org.bouncycastle:bcpkix-jdk15on < 1.61 |
org.bouncycastle:bcpkix-jdk15on:1.68 |
|
5.3 |
jakarta.el:jakarta.el-api < 3.0.4 |
jakarta.el:jakarta.el-api:3.0.4 |
|
2.7 |
org.eclipse.jetty:jetty-http < 9.4.46 |
org.eclipse.jetty:jetty-http:9.4.48.v20220622 |
|
NA |
NA |
io.confluent:confluent-log4j |
ch.qos.reload4j:reload4j:1.2.19 Confluent has migrated to reload4j that is maintained by the original author of Log4j for security patches. |