chore(findings): cypress/included
Summary
cypress/included has 82 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2024-26768 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26774 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26712 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2023-52639 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26722 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26700 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26737 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2023-52641 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26771 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26726 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26751 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26731 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26710 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31081 | Anchore CVE | Low | xvfb-2:21.1.7-3+deb12u5 |
CVE-2024-26767 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26766 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26765 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26779 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26752 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2023-52640 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26749 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26741 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26715 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26707 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26704 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26761 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26777 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26740 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26702 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26687 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26718 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26735 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26754 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26756 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26770 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26719 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26699 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26695 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26736 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31083 | Anchore CVE | Low | xserver-common-2:21.1.7-3+deb12u5 |
CVE-2024-26685 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2023-52638 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26689 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26748 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26778 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26698 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26727 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26696 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26763 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31082 | Anchore CVE | Low | xserver-common-2:21.1.7-3+deb12u5 |
CVE-2023-52637 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26706 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26776 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26697 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26743 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26772 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26758 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26760 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26742 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31081 | Anchore CVE | Low | xserver-common-2:21.1.7-3+deb12u5 |
CVE-2024-26688 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26720 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26759 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26739 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31082 | Anchore CVE | Low | xvfb-2:21.1.7-3+deb12u5 |
CVE-2024-31080 | Anchore CVE | Low | xvfb-2:21.1.7-3+deb12u5 |
CVE-2024-26764 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26744 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31083 | Anchore CVE | Low | xvfb-2:21.1.7-3+deb12u5 |
CVE-2024-26691 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26733 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-31080 | Anchore CVE | Low | xserver-common-2:21.1.7-3+deb12u5 |
CVE-2024-26753 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26757 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26714 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26769 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26747 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26773 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26717 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26723 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26775 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
CVE-2024-26686 | Anchore CVE | Low | linux-libc-dev-6.1.76-1 |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=cypress/included&tag=13.7.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.