chore(findings): aqua-security/enterprise/gateway-6.0
Summary
aqua-security/enterprise/gateway-6.0 has 97 new findings discovered during continuous monitoring.
id | source | package |
---|---|---|
CVE-2019-20838 | twistlock_cve | pcre-8.42-4.el8 |
CVE-2020-14155 | twistlock_cve | pcre-8.42-4.el8 |
CVE-2021-20231 | twistlock_cve | gnutls-3.6.14-8.el8_3 |
CVE-2021-20232 | twistlock_cve | gnutls-3.6.14-8.el8_3 |
CVE-2021-3445 | twistlock_cve | libdnf-0.55.0-7.el8 |
CVE-2020-14039 | twistlock_cve | go-1.13.6 |
CVE-2020-12762 | twistlock_cve | json-c-0.13.1-0.4.el8 |
CVE-2019-17594 | twistlock_cve | ncurses-libs-6.1-7.20180224.el8 |
CVE-2019-17595 | twistlock_cve | ncurses-libs-6.1-7.20180224.el8 |
CVE-2021-33574 | twistlock_cve | glibc-common-2.28-151.el8 |
CVE-2021-27645 | twistlock_cve | glibc-common-2.28-151.el8 |
CVE-2021-35942 | twistlock_cve | glibc-common-2.28-151.el8 |
CVE-2021-23840 | twistlock_cve | openssl-libs-1.1.1g-15.el8_3 |
CVE-2021-20232 | twistlock_cve | nettle-3.4.1-4.el8_3 |
CVE-2021-20231 | twistlock_cve | nettle-3.4.1-4.el8_3 |
CVE-2021-28153 | twistlock_cve | glib2-2.56.4-10.el8_4.1 |
CVE-2019-18218 | twistlock_cve | file-libs-5.33-16.el8_3.1 |
CVE-2021-22876 | twistlock_cve | curl-7.61.1-18.el8_4.2 |
CVE-2021-22898 | twistlock_cve | curl-7.61.1-18.el8_4.2 |
CVE-2021-22925 | twistlock_cve | curl-7.61.1-18.el8_4.2 |
CVE-2021-20266 | twistlock_cve | rpm-libs-4.14.3-14.el8_4 |
CVE-2021-3200 | twistlock_cve | libsolv-0.7.16-3.el8_4 |
CVE-2021-3572 | twistlock_cve | platform-python-pip-9.0.3-19.el8 |
CVE-2021-3426 | twistlock_cve | platform-python-3.6.8-39.el8_4 |
CVE-2021-42574 | twistlock_cve | libgcc-8.4.1-1.el8 |
CVE-2021-42694 | twistlock_cve | libgcc-8.4.1-1.el8 |
CVE-2019-17594 | twistlock_cve | ncurses-base-6.1-7.20180224.el8 |
CVE-2019-17595 | twistlock_cve | ncurses-base-6.1-7.20180224.el8 |
CVE-2021-33574 | twistlock_cve | glibc-minimal-langpack-2.28-151.el8 |
CVE-2021-27645 | twistlock_cve | glibc-minimal-langpack-2.28-151.el8 |
CVE-2021-35942 | twistlock_cve | glibc-minimal-langpack-2.28-151.el8 |
CVE-2021-33574 | twistlock_cve | glibc-2.28-151.el8 |
CVE-2021-27645 | twistlock_cve | glibc-2.28-151.el8 |
CVE-2021-35942 | twistlock_cve | glibc-2.28-151.el8 |
CVE-2021-36084 | twistlock_cve | libsepol-2.9-2.el8 |
CVE-2021-36085 | twistlock_cve | libsepol-2.9-2.el8 |
CVE-2021-36086 | twistlock_cve | libsepol-2.9-2.el8 |
CVE-2021-36087 | twistlock_cve | libsepol-2.9-2.el8 |
CVE-2021-33560 | twistlock_cve | libgcrypt-1.8.5-4.el8 |
CVE-2019-19603 | twistlock_cve | sqlite-libs-3.26.0-13.el8 |
CVE-2019-5827 | twistlock_cve | sqlite-libs-3.26.0-13.el8 |
CVE-2019-13751 | twistlock_cve | sqlite-libs-3.26.0-13.el8 |
CVE-2019-13750 | twistlock_cve | sqlite-libs-3.26.0-13.el8 |
CVE-2020-13435 | twistlock_cve | sqlite-libs-3.26.0-13.el8 |
CVE-2020-24370 | twistlock_cve | lua-libs-5.3.4-11.el8 |
CVE-2021-3580 | twistlock_cve | gnutls-3.6.14-8.el8_3 |
CVE-2020-16135 | twistlock_cve | libssh-config-0.9.4-2.el8 |
CVE-2021-22876 | twistlock_cve | libcurl-7.61.1-18.el8_4.2 |
CVE-2021-22898 | twistlock_cve | libcurl-7.61.1-18.el8_4.2 |
CVE-2021-22925 | twistlock_cve | libcurl-7.61.1-18.el8_4.2 |
CVE-2021-20266 | twistlock_cve | rpm-4.14.3-14.el8_4 |
CVE-2021-3572 | twistlock_cve | python3-pip-wheel-9.0.3-19.el8 |
CVE-2021-3426 | twistlock_cve | python3-libs-3.6.8-39.el8_4 |
CVE-2021-20231 | anchore_cve | nettle-3.4.1-4.el8_3 |
CVE-2018-20673 | anchore_cve | libgcc-8.4.1-1.el8 |
CVE-2021-20232 | anchore_cve | nettle-3.4.1-4.el8_3 |
CVE-2021-3580 | anchore_cve | gnutls-3.6.14-8.el8_3 |
CVE-2021-42574 | anchore_cve | libgcc-8.4.1-1.el8 |
CVE-2021-36084 | oscap_comp | Uninherited |
CVE-2021-36085 | oscap_comp | Uninherited |
CVE-2021-36086 | oscap_comp | Uninherited |
CVE-2021-36087 | oscap_comp | Uninherited |
CVE-2021-22876 | oscap_comp | Uninherited |
CVE-2021-22898 | oscap_comp | Uninherited |
CVE-2021-22925 | oscap_comp | Uninherited |
CVE-2020-24370 | oscap_comp | Uninherited |
CVE-2021-20266 | oscap_comp | Uninherited |
CVE-2021-3445 | oscap_comp | Uninherited |
CVE-2021-3572 | oscap_comp | Uninherited |
CVE-2021-20231 | oscap_comp | Uninherited |
CVE-2021-20232 | oscap_comp | Uninherited |
CVE-2021-3580 | oscap_comp | Uninherited |
CVE-2019-17594 | oscap_comp | Uninherited |
CVE-2019-17595 | oscap_comp | Uninherited |
CVE-2021-23841 | oscap_comp | Uninherited |
CVE-2021-33560 | oscap_comp | Uninherited |
CVE-2021-3200 | oscap_comp | Uninherited |
CVE-2021-3426 | oscap_comp | Uninherited |
CVE-2019-13750 | oscap_comp | Uninherited |
CVE-2019-13751 | oscap_comp | Uninherited |
CVE-2019-19603 | oscap_comp | Uninherited |
CVE-2019-5827 | oscap_comp | Uninherited |
CVE-2020-13435 | oscap_comp | Uninherited |
CVE-2020-16135 | oscap_comp | Uninherited |
CVE-2018-20673 | oscap_comp | Uninherited |
CVE-2021-28153 | oscap_comp | Uninherited |
CVE-2021-3800 | oscap_comp | Uninherited |
CVE-2020-12762 | oscap_comp | Uninherited |
CVE-2019-18218 | oscap_comp | Uninherited |
CVE-2019-20838 | oscap_comp | Uninherited |
CVE-2020-14155 | oscap_comp | Uninherited |
CVE-2021-27645 | oscap_comp | Uninherited |
CVE-2021-33574 | oscap_comp | Uninherited |
CVE-2021-35942 | oscap_comp | Uninherited |
CVE-2020-17049 | twistlock_cve | krb5-libs-1.18.2-8.3.el8_4 |
CVE-2021-42574 | oscap_comp | Uninherited |
CVE-2021-23840 | oscap_comp | Uninherited |
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/aqua-security/enterprise/gateway-6.0/-/jobs/8180515
Definition of Done
Justifications:
-
All findings have been justified -
Justifications have been provided to the container hardening team
Approval Process:
-
Findings Approver has reviewed and approved all justifications -
Approval request has been sent to Authorizing Official -
Approval request has been processed by Authorizing Official