Security Vulnerabilities are reported for aaf/authz were from old repo.  We are working on latest code that committed to the aaf repo.

RepositoryGroupImpact AnalysisAction
aaf-authzio.netty:netty-handler

Instrumental:

This has been RESOLVED by updating the Version netty handler is not longer on the report, 4/25:


https://nexus-iq.wl.linuxfoundation.org/assets/index.html#/reports/aaf-authz/8a3ac7244a394bd892545012abd27864


N

aaf-authz

org.apache.httpcomponents


also "commons-beans-utils1.8.3", "org.apache.shiro:shiro-core:1.3.2" 

httpcomponents resolved, but "common-beans-utils" and "shire-core" remain. HOWEVER:

These are ONLY used by Shiro Adapter. This Shiro Adapter is NOT used in any running AAF components or any part of CADI.

04/27/2018

The Adapter is ONLY used by OTHER apps which are using Shiro (and thus the vulnerability is on those apps, not AAF)

THEREFORE, this is a false positive for AAF as a Service or Clients.


N
aaf-authzorg.bouncycastle

org.bouncycastle updated to latest version,

There are NO LONGER any Security issues related to Bouncy Castle.

The License is MIT, which is listed as a Policy violation, however.



Impact:

Replacement of Bouncy Castle is not trivial. Cannot simply replace in short timeframe.

Is the License from MIT an unacceptable risk going forward?


N