chore(findings): opensource/jaegertracing/jaeger-query (arm64)
Summary
opensource/jaegertracing/jaeger-query (arm64) has 83 new findings discovered during continuous monitoring.
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/jaegertracing/jaeger-query&tag=1.66.0-arm64&branch=master
id | source | severity | package | impact | workaround |
---|---|---|---|---|---|
CVE-2015-0204 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0205 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0206 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0209 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0286 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0287 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0288 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0292 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-0293 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-1790 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-1791 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-3194 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-3195 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-3197 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-3216 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-4000 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2015-7575 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0702 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0703 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0704 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0705 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0797 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0799 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-0800 | Twistlock CVE | High | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2105 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2106 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2107 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2108 | Twistlock CVE | High | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2109 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2177 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2178 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2179 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2181 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2182 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2183 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-2842 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-6302 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-6304 | Twistlock CVE | High | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-6306 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-7055 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-7056 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2016-8610 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2017-3731 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2017-3732 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2017-3735 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2017-3736 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2017-3737 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-0495 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-0732 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-0734 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-0737 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-0739 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2018-5407 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2019-1547 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2019-1549 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2019-1551 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2019-1559 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2019-1563 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2020-1968 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2021-23839 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2021-23840 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2021-23841 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2021-3712 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-0778 | Twistlock CVE | High | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-1292 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-2068 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-2097 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-4304 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2022-4450 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-0215 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-0286 | Twistlock CVE | High | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-0464 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-0465 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-0466 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-2650 | Twistlock CVE | Medium | openssl-3.2.2-6.el9_5.1 | ||
CVE-2023-2975 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2024-13176 | Anchore CVE | Low | openssl-libs-1:3.2.2-6.el9_5.1 | ||
CVE-2024-13176 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2024-41996 | Anchore CVE | Low | openssl-libs-1:3.2.2-6.el9_5.1 | ||
CVE-2024-41996 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2024-4741 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2024-5535 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 | ||
CVE-2024-9143 | Twistlock CVE | Low | openssl-3.2.2-6.el9_5.1 |
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/jaegertracing/jaeger-query&tag=1.66.0-arm64&branch=master
Tasks
Contributor:
- Provide justifications for findings in the VAT (docs)
- Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
- Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.