The new version 1.0rc1-rc2
have a lower number of vulnerabilities 3-4 in the fallowing jar files
rc1
org.apache.hadoop_hadoop-common version 2.10.2 has 1 vulnerability
org.apache.hadoop_hadoop-common version 3.3.1 has 2 vulnerabilities
com.fasterxml.jackson.core_jackson-databind version 2.4.0 has 1 vulnerability
rc2 has only the last two
the origin of the problem is the fallowing layer
ADD file:18e71f049606f6339ce7a995839623f50e6ec6474bfd0a3a7ca799db726f47f6 in /
which seems to be not upto date
the 6.3 version has 10 vulnerabilities
from the fallowing layer
ENV JANUS_VERSION=0.6.3 JANUS_HOME=/opt/janusgraph JANUS_CONFIG_DIR=/etc/opt/janusgraph JANUS_DATA_DIR=/var/lib/janusgraph JANUS_SERVER_TIMEOUT=30 JANUS_STORAGE_TIMEOUT=60 JANUS_PROPS_TEMPLATE=berkeleyje-lucene JANUS_INITDB_DIR=/docker-entrypoint-initdb.d gremlinserver.graphs.graph=/etc/opt/janusgraph/janusgraph.properties gremlinserver.threadPoolWorker=1 gremlinserver.gremlinPool=8
with these cve
org.apache.hadoop_hadoop-common 2.8.5 [
CVE-2022-26612](https://nvd.nist.gov/vuln/detail/
CVE-2022-26612) critical
org.apache.hadoop_hadoop-common 2.8.5 [
CVE-2022-25168](https://nvd.nist.gov/vuln/detail/
CVE-2022-25168) critical
log4j_log4j 1.2.17 [
CVE-2022-23305](https://nvd.nist.gov/vuln/detail/
CVE-2022-23305) critical
org.apache.hadoop_hadoop-common 2.8.5 [
CVE-2021-37404](https://nvd.nist.gov/vuln/detail/
CVE-2021-37404) critical
log4j_log4j 1.2.17 [
CVE-2020-9493](https://nvd.nist.gov/vuln/detail/
CVE-2020-9493) critical
io.netty_netty-all 4.1.34.Final [
CVE-2019-20445](https://nvd.nist.gov/vuln/detail/
CVE-2019-20445) critical
io.netty_netty-all 4.1.34.Final [
CVE-2019-20444](https://nvd.nist.gov/vuln/detail/
CVE-2019-20444) critical
log4j_log4j 1.2.17 [
CVE-2019-17571](https://nvd.nist.gov/vuln/detail/
CVE-2019-17571) critical
com.nimbusds_nimbus-jose-jwt 4.41.1 [
CVE-2019-17195](https://nvd.nist.gov/vuln/detail/
CVE-2019-17195) critical
com.fasterxml.jackson.core_jackson-databind 2.4.0 [
CVE-2018-7489](https://nvd.nist.gov/vuln/detail/
CVE-2018-7489) critical
Solving these vulnerabilities at the source could help organizations trying to adopt Janusgraph do so with ease and safety.
The new version 1.0rc1-rc2
have a lower number of vulnerabilities 3-4 in the fallowing jar files
rc1
org.apache.hadoop_hadoop-common version 2.10.2 has 1 vulnerability
org.apache.hadoop_hadoop-common version 3.3.1 has 2 vulnerabilities
com.fasterxml.jackson.core_jackson-databind version 2.4.0 has 1 vulnerability
rc2 has only the last two
the origin of the problem is the fallowing layer
ADD file:18e71f049606f6339ce7a995839623f50e6ec6474bfd0a3a7ca799db726f47f6 in /
which seems to be not upto date
the 6.3 version has 10 vulnerabilities
from the fallowing layer
ENV JANUS_VERSION=0.6.3 JANUS_HOME=/opt/janusgraph JANUS_CONFIG_DIR=/etc/opt/janusgraph JANUS_DATA_DIR=/var/lib/janusgraph JANUS_SERVER_TIMEOUT=30 JANUS_STORAGE_TIMEOUT=60 JANUS_PROPS_TEMPLATE=berkeleyje-lucene JANUS_INITDB_DIR=/docker-entrypoint-initdb.d gremlinserver.graphs.graph=/etc/opt/janusgraph/janusgraph.properties gremlinserver.threadPoolWorker=1 gremlinserver.gremlinPool=8
with these cve
Solving these vulnerabilities at the source could help organizations trying to adopt Janusgraph do so with ease and safety.