chore(findings): ironbank-pipelines/suse-podman
Summary
ironbank-pipelines/suse-podman has 163 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
cbff271f45d32e78dcc1979dbca9c14d | Anchore Compliance | Critical | |
7b3ee6e9fa9cfa8fcf64f2e59b90be3c | Anchore Compliance | Critical | |
03ad7c971b32b0a5afb229fb546ec84a | Anchore Compliance | Critical | |
CVE-2017-1000368 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2019-14287 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2014-9680 | Anchore CVE | Low | sudo-1.9.9-150400.4.26.1 |
CVE-2021-3156 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2017-1000367 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2023-28486 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2020-29130 | Anchore CVE | Medium | slirp4netns-1.2.0-150300.8.5.2 |
CVE-2020-1983 | Anchore CVE | High | libslirp0-4.7.0+44-150300.15.2 |
CVE-2023-28487 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2021-23240 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2022-43995 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2020-10756 | Anchore CVE | Medium | libslirp0-4.7.0+44-150300.15.2 |
CVE-2023-22809 | Anchore CVE | High | sudo-1.9.9-150400.4.26.1 |
CVE-2021-23239 | Anchore CVE | Low | sudo-1.9.9-150400.4.26.1 |
CVE-2021-3593 | Anchore CVE | Low | libslirp0-4.7.0+44-150300.15.2 |
CVE-2016-7076 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2019-18634 | Anchore CVE | Critical | sudo-1.9.9-150400.4.26.1 |
CVE-2021-3592 | Anchore CVE | Low | libslirp0-4.7.0+44-150300.15.2 |
CVE-2016-7032 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2021-3594 | Anchore CVE | Low | libslirp0-4.7.0+44-150300.15.2 |
CVE-2021-3595 | Anchore CVE | Low | libslirp0-4.7.0+44-150300.15.2 |
CVE-2019-6778 | Anchore CVE | High | slirp4netns-1.2.0-150300.8.5.2 |
CVE-2023-27320 | Anchore CVE | Medium | sudo-1.9.9-150400.4.26.1 |
CVE-2021-3602 | Anchore CVE | Medium | libcontainers-common-20230214-150400.3.11.1 |
CVE-2021-20291 | Anchore CVE | Medium | libcontainers-common-20230214-150400.3.11.1 |
CVE-2021-20291 | Anchore CVE | Medium | libcontainers-sles-mounts-20230214-150400.3.11.1 |
CVE-2021-3602 | Anchore CVE | Medium | libcontainers-sles-mounts-20230214-150400.3.11.1 |
CVE-2022-1271 | Anchore CVE | High | libapparmor1-3.0.4-150400.5.9.1 |
CVE-2017-6507 | Anchore CVE | Medium | libapparmor1-3.0.4-150400.5.9.1 |
CVE-2021-20206 | Anchore CVE | High | cni-plugins-0.8.6-150100.3.20.1 |
CVE-2021-20206 | Anchore CVE | High | cni-0.7.1-150100.3.16.1 |
CVE-2020-10749 | Anchore CVE | Medium | cni-plugins-0.8.6-150100.3.20.1 |
CVE-2018-10856 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2021-20206 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2022-2989 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2021-20199 | Anchore CVE | Low | podman-4.4.4-150400.4.19.1 |
CVE-2022-21698 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2019-10214 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2022-27649 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2019-10152 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2021-41190 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2021-4024 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2022-1227 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2020-1726 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2022-27191 | Anchore CVE | High | podman-4.4.4-150400.4.19.1 |
CVE-2023-0778 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CVE-2020-14370 | Anchore CVE | Medium | podman-4.4.4-150400.4.19.1 |
CCE-85678-1 | OSCAP Compliance | Medium | |
CCE-85619-5 | OSCAP Compliance | Medium | |
CCE-85564-3 | OSCAP Compliance | Medium | |
CCE-85677-3 | OSCAP Compliance | Medium | |
CCE-85676-5 | OSCAP Compliance | Medium | |
CCE-85573-4 | OSCAP Compliance | Medium | |
CCE-85574-2 | OSCAP Compliance | Medium | |
CCE-85575-9 | OSCAP Compliance | Medium | |
CCE-85675-7 | OSCAP Compliance | Medium | |
CCE-85665-8 | OSCAP Compliance | High | |
CCE-85641-9 | OSCAP Compliance | Medium | |
CCE-85755-7 | OSCAP Compliance | Medium | |
CVE-2019-6778 | OSCAP Compliance | Medium | |
CVE-2020-10756 | OSCAP Compliance | Medium | |
CVE-2020-1983 | OSCAP Compliance | Medium | |
CVE-2020-29130 | OSCAP Compliance | Medium | |
CVE-2018-10856 | OSCAP Compliance | Medium | |
CVE-2019-10152 | OSCAP Compliance | Medium | |
CVE-2019-10214 | OSCAP Compliance | Medium | |
CVE-2020-14370 | OSCAP Compliance | Medium | |
CVE-2020-1726 | OSCAP Compliance | Medium | |
CVE-2021-20199 | OSCAP Compliance | Medium | |
CVE-2021-20206 | OSCAP Compliance | Medium | |
CVE-2021-4024 | OSCAP Compliance | Medium | |
CVE-2021-41190 | OSCAP Compliance | Medium | |
CVE-2022-1227 | OSCAP Compliance | Medium | |
CVE-2022-21698 | OSCAP Compliance | Medium | |
CVE-2022-27191 | OSCAP Compliance | Medium | |
CVE-2022-27649 | OSCAP Compliance | Medium | |
CVE-2022-2989 | OSCAP Compliance | Medium | |
CVE-2023-0778 | OSCAP Compliance | Medium | |
CVE-2020-10749 | OSCAP Compliance | Medium | |
CVE-2014-9680 | OSCAP Compliance | Medium | |
CVE-2016-7032 | OSCAP Compliance | Medium | |
CVE-2016-7076 | OSCAP Compliance | Medium | |
CVE-2017-1000367 | OSCAP Compliance | Medium | |
CVE-2017-1000368 | OSCAP Compliance | Medium | |
CVE-2019-14287 | OSCAP Compliance | Medium | |
CVE-2019-18634 | OSCAP Compliance | Medium | |
CVE-2021-23239 | OSCAP Compliance | Medium | |
CVE-2021-23240 | OSCAP Compliance | Medium | |
CVE-2021-3156 | OSCAP Compliance | Medium | |
CVE-2022-43995 | OSCAP Compliance | Medium | |
CVE-2023-22809 | OSCAP Compliance | Medium | |
CVE-2023-27320 | OSCAP Compliance | Medium | |
CVE-2023-28486 | OSCAP Compliance | Medium | |
CVE-2023-28487 | OSCAP Compliance | Medium | |
CVE-2021-3592 | OSCAP Compliance | Medium | |
CVE-2021-3593 | OSCAP Compliance | Medium | |
CVE-2021-3594 | OSCAP Compliance | Medium | |
CVE-2021-3595 | OSCAP Compliance | Medium | |
CVE-2018-15664 | OSCAP Compliance | Medium | |
CVE-2020-15157 | OSCAP Compliance | Medium | |
CVE-2021-20291 | OSCAP Compliance | Medium | |
CVE-2021-3602 | OSCAP Compliance | Medium | |
CVE-2017-6507 | OSCAP Compliance | Medium | |
CVE-2022-1271 | OSCAP Compliance | Medium | |
CCE-85565-0 | OSCAP Compliance | Medium | |
CCE-85764-9 | OSCAP Compliance | Medium | |
CCE-91151-1 | OSCAP Compliance | Medium | |
PRISMA-2023-0056 | Twistlock CVE | Medium | github.com/sirupsen/logrus-v1.9.0 |
PRISMA-2023-0056 | Twistlock CVE | Medium | github.com/sirupsen/logrus-v1.8.1 |
GHSA-6xv5-86q9-7xr8 | Twistlock CVE | Medium | github.com/cyphar/filepath-securejoin-v0.2.3 |
GHSA-m425-mq94-257g | Twistlock CVE | High | google.golang.org/grpc-v1.51.0 |
GHSA-jq35-85cj-fj4p | Twistlock CVE | Medium | github.com/docker/docker-v20.10.23 |
GHSA-2c7c-3mj9-8fqh | Twistlock CVE | Medium | github.com/go-jose/go-jose/v3-v3.0.0 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.2 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.3 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.3 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.3 |
CVE-2023-45285 | Twistlock CVE | High | go-1.21.4 |
CVE-2023-3978 | Twistlock CVE | Medium | golang.org/x/net-v0.8.0 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.4 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.3 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.3 |
CVE-2023-39326 | Twistlock CVE | Medium | go-1.21.3 |
VAT: https://vat.dso.mil/vat/image?imageName=ironbank-pipelines/suse-podman&tag=v0.1.2&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=ironbank-pipelines/suse-podman&tag=v0.1.2&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.