Skip to content

Conversation

@jamie-albert
Copy link
Member

Summary

Fixes GHSA-3677-xxcr-wjqv (jose4j DoS vulnerability) by incrementing epoch to force rebuild with jose4j 0.9.6.

Changes

  • Incremented epoch from 21 to 22
  • Added comment documenting the GHSA fix

Details

The jose4j dependency was already configured in confluent-common-docker/pombump-deps.yaml at version 0.9.6, which is sufficient to fix this vulnerability:

  • Vulnerability: GHSA-3677-xxcr-wjqv (HIGH severity)
  • Issue: jose4j DoS via compressed JWE content
  • Vulnerable versions: < 0.9.5
  • Fix version: 0.9.5
  • Current pombump version: 0.9.6 ✅

The epoch increment ensures the package is rebuilt with the fixed dependency version.

Verification

  • ✅ jose4j 0.9.6 > 0.9.5 (fix version)
  • ✅ pombump configuration already includes jose4j 0.9.6
  • Build and scan will verify CVE is resolved

References

@octo-sts octo-sts bot added the bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages. label Dec 31, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

bincapz/pass bincapz/pass Bincapz (aka. malcontent) scan didn't detect any CRITICALs on the scanned packages.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant