chore(findings): opensource/debian/debian
Summary
opensource/debian/debian has 33 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-45918 | Anchore CVE | Low | ncurses-base-6.4-4 |
CVE-2023-50495 | Anchore CVE | Medium | libtinfo6-6.4-4 |
CVE-2024-26462 | Anchore CVE | Low | libgssapi-krb5-2-1.20.1-2+deb12u1 |
CVE-2023-29383 | Anchore CVE | Low | login-1:4.13+dfsg1-1+b1 |
CVE-2023-4039 | Anchore CVE | Medium | libgcc-s1-12.2.0-14 |
CVE-2024-2236 | Anchore CVE | Medium | libgcrypt20-1.10.1-3 |
CVE-2024-26461 | Anchore CVE | Low | libgssapi-krb5-2-1.20.1-2+deb12u1 |
CVE-2024-22365 | Anchore CVE | Medium | libpam0g-1.5.2-6+deb12u1 |
CVE-2023-6129 | Anchore CVE | Medium | openssl-3.0.13 |
CVE-2023-4039 | Anchore CVE | Medium | gcc-12-base-12.2.0-14 |
CVE-2024-0727 | Anchore CVE | Medium | openssl-3.0.13 |
CVE-2023-31484 | Anchore CVE | High | perl-5.36.0-7+deb12u1 |
CVE-2024-26458 | Anchore CVE | Low | libgssapi-krb5-2-1.20.1-2+deb12u1 |
CVE-2023-45918 | Anchore CVE | Low | libtinfo6-6.4-4 |
CVE-2023-50387 | Anchore CVE | High | libudev1-252.22-1~deb12u1 |
CVE-2023-6237 | Anchore CVE | Low | openssl-3.0.13 |
CVE-2024-22365 | Anchore CVE | Medium | libpam-modules-bin-1.5.2-6+deb12u1 |
CVE-2023-4641 | Anchore CVE | Medium | passwd-1:4.13+dfsg1-1+b1 |
CVE-2023-50495 | Anchore CVE | Medium | ncurses-bin-6.4-4 |
CVE-2023-50868 | Anchore CVE | Low | libsystemd0-252.22-1~deb12u1 |
CVE-2016-2781 | Anchore CVE | Low | coreutils-9.1-1 |
CVE-2023-45853 | Anchore CVE | Critical | zlib1g-1:1.2.13.dfsg-1 |
CVE-2023-4039 | Anchore CVE | Medium | libstdc++6-12.2.0-14 |
CVE-2024-22365 | Anchore CVE | Medium | libpam-modules-1.5.2-6+deb12u1 |
CVE-2023-29383 | Anchore CVE | Low | passwd-1:4.13+dfsg1-1+b1 |
CVE-2023-45918 | Anchore CVE | Low | ncurses-bin-6.4-4 |
CVE-2023-50387 | Anchore CVE | High | libsystemd0-252.22-1~deb12u1 |
CVE-2024-22365 | Anchore CVE | Medium | libpam-runtime-1.5.2-6+deb12u1 |
CVE-2023-50868 | Anchore CVE | Low | libudev1-252.22-1~deb12u1 |
CVE-2023-31484 | Anchore CVE | High | perl-base-5.36.0-7+deb12u1 |
CVE-2023-4641 | Anchore CVE | Medium | login-1:4.13+dfsg1-1+b1 |
CVE-2023-50495 | Anchore CVE | Medium | ncurses-base-6.4-4 |
CVE-2023-5678 | Anchore CVE | Medium | openssl-3.0.13 |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/debian/debian&tag=12.5&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.