chore(findings): opensource/go-gitea/gitea
Summary
opensource/go-gitea/gitea has 67 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Basename-0:2.85-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-File-stat-0:1.09-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-lib-0:0.65-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-AutoLoader-0:5.74-480.el9 |
GHSA-cf6v-9j57-v6r6 | Anchore CVE | Low | code.gitea.io/gitea-(devel) |
GHSA-h3q4-vmw4-cpr5 | Anchore CVE | Medium | code.gitea.io/gitea-(devel) |
GHSA-fg3x-rwq9-74cw | Anchore CVE | High | code.gitea.io/gitea-(devel) |
GHSA-p5f9-c9j9-g8qx | Anchore CVE | High | code.gitea.io/gitea-(devel) |
CVE-2023-47038 | Anchore CVE | Medium | perl-if-0:0.60.800-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-base-0:2.27-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-IPC-Open3-0:1.21-480.el9 |
GHSA-g95p-88p4-76cm | Anchore CVE | Medium | code.gitea.io/gitea-(devel) |
GHSA-hf6f-jq25-8gq9 | Anchore CVE | Critical | code.gitea.io/gitea-(devel) |
CVE-2023-47038 | Anchore CVE | Medium | perl-Errno-0:1.30-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-FileHandle-0:2.03-480.el9 |
CVE-2023-48795 | Anchore CVE | Medium | openssh-8.7p1-34.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-overload-0:1.31-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-mro-0:1.23-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Class-Struct-0:0.66-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-interpreter-4:5.32.1-480.el9 |
GHSA-hfmf-q69j-6m5p | Anchore CVE | Critical | code.gitea.io/gitea-(devel) |
CVE-2023-51385 | Anchore CVE | Medium | openssh-clients-8.7p1-34.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-B-0:1.80-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-SelectSaver-0:1.02-480.el9 |
GHSA-g7p7-x6w7-w6qg | Anchore CVE | High | code.gitea.io/gitea-(devel) |
CVE-2023-47038 | Anchore CVE | Medium | perl-libs-4:5.32.1-480.el9 |
CVE-2023-51385 | Anchore CVE | Medium | openssh-8.7p1-34.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-subs-0:1.03-480.el9 |
CVE-2023-48795 | Anchore CVE | Medium | openssh-clients-8.7p1-34.el9 |
GHSA-ph3w-2843-72mx | Anchore CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2023-47038 | Anchore CVE | Medium | perl-POSIX-0:1.94-480.el9 |
GHSA-mw99-9chc-xw7r | Anchore CVE | High | github.com/go-git/go-git/v5-v5.9.0 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Fcntl-0:1.13-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-DynaLoader-0:1.47-480.el9 |
GHSA-pg38-r834-g45j | Anchore CVE | Critical | code.gitea.io/gitea-(devel) |
GHSA-8j3v-68w3-3848 | Anchore CVE | Medium | code.gitea.io/gitea-(devel) |
GHSA-jr9c-h74f-2v28 | Anchore CVE | High | code.gitea.io/gitea-(devel) |
CVE-2023-47038 | Anchore CVE | Medium | perl-NDBM_File-0:1.15-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Find-0:1.37-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Symbol-0:1.08-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-vars-0:1.05-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-IO-0:1.43-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-overloading-0:0.02-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Getopt-Std-0:1.12-480.el9 |
CVE-2017-1000383 | Anchore CVE | Low | emacs-filesystem-1:27.2-9.el9 |
GHSA-5rh7-6gfj-mc87 | Anchore CVE | Medium | code.gitea.io/gitea-(devel) |
GHSA-9763-4f94-gfch | Anchore CVE | High | github.com/cloudflare/circl-v1.3.3 |
GHSA-449p-3h89-pw88 | Anchore CVE | Critical | github.com/go-git/go-git/v5-v5.9.0 |
CCE-83639-5 | OSCAP Compliance | Medium | |
CCE-89442-8 | OSCAP Compliance | Medium | |
CVE-2021-45331 | Twistlock CVE | Critical | code.gitea.io/gitea-(devel) |
CVE-2021-45330 | Twistlock CVE | Critical | code.gitea.io/gitea-(devel) |
CVE-2018-18926 | Twistlock CVE | Critical | code.gitea.io/gitea-(devel) |
CVE-2018-15192 | Twistlock CVE | High | code.gitea.io/gitea-(devel) |
CVE-2023-49568 | Twistlock CVE | High | github.com/go-git/go-git/v5-v5.9.0 |
CVE-2022-30781 | Twistlock CVE | High | code.gitea.io/gitea-(devel) |
CVE-2022-27313 | Twistlock CVE | High | code.gitea.io/gitea-(devel) |
CVE-2022-0905 | Twistlock CVE | High | code.gitea.io/gitea-(devel) |
CVE-2022-38795 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2019-1010261 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2021-28378 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
PRISMA-2023-0025 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2021-29134 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2022-1928 | Twistlock CVE | Medium | code.gitea.io/gitea-(devel) |
CVE-2023-3515 | Twistlock CVE | Low | code.gitea.io/gitea-(devel) |
CVE-2023-49569 | Twistlock CVE | Critical | github.com/go-git/go-git/v5-v5.9.0 |
GHSA-9763-4f94-gfch | Twistlock CVE | High | github.com/cloudflare/circl-v1.3.3 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/go-gitea/gitea&tag=v1.21.3&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/go-gitea/gitea&tag=v1.21.0-ubi9&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.