chore(findings): opensource/jenkins/jenkins
Summary
opensource/jenkins/jenkins has 207 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2021-3997 | Anchore CVE | Medium | systemd-pam-252-32.el9_4 |
CVE-2017-16232 | Anchore CVE | Low | libtiff-4.4.0-12.el9 |
CVE-2023-42883 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-32636 | Anchore CVE | Low | glib2-2.68.4-14.el9 |
CVE-2023-43785 | Anchore CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2022-0391 | Anchore CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2023-43786 | Anchore CVE | Medium | libX11-1.7.0-9.el9 |
CVE-2024-22365 | Anchore CVE | Medium | pam-1.5.1-19.el9 |
CVE-2024-2961 | Anchore CVE | High | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-langpack-en-2.34-100.el9 |
CVE-2023-3817 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2023-41983 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-2.34-100.el9 |
CVE-2024-33602 | Anchore CVE | Low | glibc-common-2.34-100.el9 |
CVE-2023-43787 | Anchore CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2024-0727 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2023-6129 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-rpm-macros-252-32.el9_4 |
CVE-2023-3618 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2024-33601 | Anchore CVE | Low | glibc-common-2.34-100.el9 |
CVE-2024-23280 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-33602 | Anchore CVE | Low | glibc-minimal-langpack-2.34-100.el9 |
CVE-2022-38784 | Anchore CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2022-37050 | Anchore CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2023-6597 | Anchore CVE | High | python-unversioned-command-3.9.18-3.el9 |
CVE-2021-23336 | Anchore CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2023-6237 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2022-30294 | Anchore CVE | Low | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-252-32.el9_4 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-39928 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-38472 | Anchore CVE | Medium | avahi-libs-0.8-20.el9 |
CVE-2023-43787 | Anchore CVE | Medium | libX11-1.7.0-9.el9 |
CVE-2023-43786 | Anchore CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2022-0391 | Anchore CVE | Medium | python3-3.9.18-3.el9 |
CVE-2023-2975 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2022-48554 | Anchore CVE | Low | file-libs-5.39-16.el9 |
CVE-2023-6129 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2023-3817 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2023-3446 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-libs-252-32.el9_4 |
CVE-2023-6597 | Anchore CVE | High | python3-3.9.18-3.el9 |
CVE-2023-40745 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-udev-252-32.el9_4 |
CVE-2023-3446 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2024-23263 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2022-0391 | Anchore CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2024-33601 | Anchore CVE | Low | glibc-langpack-en-2.34-100.el9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-rpm-macros-252-32.el9_4 |
CVE-2023-5678 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2021-29390 | Anchore CVE | Medium | libjpeg-turbo-2.0.90-7.el9 |
CVE-2024-23226 | Anchore CVE | High | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-42950 | Anchore CVE | High | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-42852 | Anchore CVE | High | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-42956 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-2398 | Anchore CVE | Medium | libcurl-minimal-7.76.1-29.el9_4 |
CVE-2023-32359 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-common-2.34-100.el9 |
CVE-2022-37052 | Anchore CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2023-41175 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2022-38784 | Anchore CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-udev-252-32.el9_4 |
CVE-2022-40090 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-42843 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-42890 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2021-23336 | Anchore CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-252-32.el9_4 |
CVE-2024-0450 | Anchore CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2022-37050 | Anchore CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2023-43787 | Anchore CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2024-0727 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2023-7008 | Anchore CVE | Medium | systemd-pam-252-32.el9_4 |
CVE-2024-0450 | Anchore CVE | Medium | python3-3.9.18-3.el9 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-minimal-langpack-2.34-100.el9 |
CVE-2023-43786 | Anchore CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2023-2953 | Anchore CVE | Low | openldap-2.6.6-3.el9 |
CVE-2024-2511 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2024-23252 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-38469 | Anchore CVE | Medium | avahi-libs-0.8-20.el9 |
CVE-2024-0450 | Anchore CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2021-23336 | Anchore CVE | Medium | python3-3.9.18-3.el9 |
CVE-2018-13419 | Anchore CVE | Low | libsndfile-1.0.31-8.el9 |
CVE-2023-2975 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2024-23284 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-5678 | Anchore CVE | Low | openssl-1:3.0.7-27.el9 |
CVE-2023-43785 | Anchore CVE | Medium | libX11-1.7.0-9.el9 |
CVE-2023-6228 | Anchore CVE | Low | libtiff-4.4.0-12.el9 |
CVE-2022-33065 | Anchore CVE | Medium | libsndfile-1.0.31-8.el9 |
CVE-2024-33599 | Anchore CVE | High | glibc-langpack-en-2.34-100.el9 |
CVE-2024-33601 | Anchore CVE | Low | glibc-2.34-100.el9 |
CVE-2024-2961 | Anchore CVE | High | glibc-langpack-en-2.34-100.el9 |
CVE-2024-33602 | Anchore CVE | Low | glibc-2.34-100.el9 |
CVE-2014-1745 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-33601 | Anchore CVE | Low | glibc-minimal-langpack-2.34-100.el9 |
CVE-2023-40414 | Anchore CVE | High | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-2961 | Anchore CVE | High | glibc-common-2.34-100.el9 |
CVE-2023-6597 | Anchore CVE | High | python3-libs-3.9.18-3.el9 |
CVE-2017-6519 | Anchore CVE | Low | avahi-libs-0.8-20.el9 |
CVE-2021-3572 | Anchore CVE | Low | python3-pip-wheel-21.2.3-8.el9 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-libs-252-32.el9_4 |
CVE-2024-33599 | Anchore CVE | High | glibc-2.34-100.el9 |
CVE-2024-23206 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-38473 | Anchore CVE | Medium | avahi-libs-0.8-20.el9 |
CVE-2023-38470 | Anchore CVE | Medium | avahi-libs-0.8-20.el9 |
CVE-2024-23213 | Anchore CVE | High | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-25193 | Anchore CVE | Medium | harfbuzz-2.7.4-10.el9 |
CVE-2022-37052 | Anchore CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2024-33599 | Anchore CVE | High | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33602 | Anchore CVE | Low | glibc-langpack-en-2.34-100.el9 |
CVE-2024-23254 | Anchore CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-2398 | Anchore CVE | Medium | curl-minimal-7.76.1-29.el9_4 |
CVE-2024-33599 | Anchore CVE | High | glibc-common-2.34-100.el9 |
CVE-2023-37328 | Anchore CVE | Medium | gstreamer1-plugins-base-1.22.1-2.el9 |
CVE-2024-2511 | Anchore CVE | Low | openssl-libs-1:3.0.7-27.el9 |
CVE-2023-38471 | Anchore CVE | Medium | avahi-libs-0.8-20.el9 |
CVE-2024-2961 | Anchore CVE | High | glibc-2.34-100.el9 |
CVE-2023-43785 | Anchore CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2023-25434 | Anchore CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-2.34-100.el9 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-langpack-en-2.34-100.el9 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-common-2.34-100.el9 |
CVE-2024-23226 | Twistlock CVE | Critical | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-42950 | Twistlock CVE | Critical | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-6597 | Twistlock CVE | Critical | python3-libs-3.9.18-3.el9 |
CVE-2023-6597 | Twistlock CVE | Critical | python3-3.9.18-3.el9 |
CVE-2023-6597 | Twistlock CVE | Critical | python-unversioned-command-3.9.18-3.el9 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-langpack-en-2.34-100.el9 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-common-2.34-100.el9 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-2.34-100.el9 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-1.7.0-9.el9 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2024-2398 | Twistlock CVE | Medium | libcurl-minimal-7.76.1-29.el9_4 |
CVE-2024-2398 | Twistlock CVE | Medium | curl-minimal-7.76.1-29.el9_4 |
CVE-2023-52356 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-52355 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-36632 | Twistlock CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2023-36632 | Twistlock CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2023-36632 | Twistlock CVE | Medium | python3-3.9.18-3.el9 |
CVE-2017-17973 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-51767 | Twistlock CVE | Medium | openssh-8.7p1-38.el9 |
CVE-2023-51767 | Twistlock CVE | Medium | openssh-clients-8.7p1-38.el9 |
CVE-2023-4504 | Twistlock CVE | Medium | cups-libs-2.3.3op2-24.el9 |
CVE-2024-23284 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-23280 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-23263 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-23254 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2023-6277 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-42956 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2022-37051 | Twistlock CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2022-37051 | Twistlock CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2022-37050 | Twistlock CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2022-37050 | Twistlock CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2024-0450 | Twistlock CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2024-0450 | Twistlock CVE | Medium | python3-3.9.18-3.el9 |
CVE-2024-0450 | Twistlock CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2021-23336 | Twistlock CVE | Medium | python3-3.9.18-3.el9 |
CVE-2021-23336 | Twistlock CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2021-23336 | Twistlock CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2023-3164 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-25435 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-25434 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2023-25433 | Twistlock CVE | Medium | libtiff-4.4.0-12.el9 |
CVE-2021-3997 | Twistlock CVE | Medium | systemd-rpm-macros-252-32.el9_4 |
CVE-2021-3997 | Twistlock CVE | Medium | systemd-udev-252-32.el9_4 |
CVE-2020-36024 | Twistlock CVE | Medium | poppler-glib-21.01.0-19.el9 |
CVE-2020-36024 | Twistlock CVE | Medium | poppler-21.01.0-19.el9 |
CVE-2023-42843 | Twistlock CVE | Medium | webkit2gtk3-jsc-2.42.5-1.el9 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-common-2.34-100.el9 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-2.34-100.el9 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-langpack-en-2.34-100.el9 |
CVE-2022-0391 | Twistlock CVE | Medium | python3-3.9.18-3.el9 |
CVE-2022-0391 | Twistlock CVE | Medium | python3-libs-3.9.18-3.el9 |
CVE-2022-0391 | Twistlock CVE | Medium | python-unversioned-command-3.9.18-3.el9 |
CVE-2023-45803 | Twistlock CVE | Medium | python3-pip-wheel-21.2.3-8.el9 |
CVE-2023-2953 | Twistlock CVE | Low | openldap-2.6.6-3.el9 |
CVE-2023-1916 | Twistlock CVE | Low | libtiff-4.4.0-12.el9 |
CVE-2020-12413 | Twistlock CVE | Low | nspr-4.35.0-7.el9_4 |
CVE-2020-12413 | Twistlock CVE | Low | nss-sysinit-3.90.0-7.el9_4 |
CVE-2020-12413 | Twistlock CVE | Low | nss-util-3.90.0-7.el9_4 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-freebl-3.90.0-7.el9_4 |
CVE-2020-12413 | Twistlock CVE | Low | nss-3.90.0-7.el9_4 |
CVE-2020-12413 | Twistlock CVE | Low | nss-softokn-3.90.0-7.el9_4 |
CVE-2017-6519 | Twistlock CVE | Low | avahi-libs-0.8-20.el9 |
CVE-2022-27943 | Twistlock CVE | Low | libatomic-11.4.1-3.el9 |
CVE-2022-27943 | Twistlock CVE | Low | libgcc-11.4.1-3.el9 |
CVE-2022-27943 | Twistlock CVE | Low | libstdc++-11.4.1-3.el9 |
CVE-2022-1056 | Twistlock CVE | Low | libtiff-4.4.0-12.el9 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-10.40-5.el9 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-syntax-10.40-5.el9 |
CVE-2021-3572 | Twistlock CVE | Low | python3-pip-wheel-21.2.3-8.el9 |
CVE-2018-13419 | Twistlock CVE | Low | libsndfile-1.0.31-8.el9 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-2.34-100.el9 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-langpack-en-2.34-100.el9 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-common-2.34-100.el9 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-common-2.34-100.el9 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-2.34-100.el9 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-minimal-langpack-2.34-100.el9 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-langpack-en-2.34-100.el9 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-libs-3.0.7-27.el9 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-3.0.7-27.el9 |
CVE-2017-16232 | Twistlock CVE | Low | libtiff-4.4.0-12.el9 |
CVE-2021-25317 | Twistlock CVE | Low | cups-libs-2.3.3op2-24.el9 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/jenkins/jenkins&tag=2.456-jdk17&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/jenkins/jenkins&tag=2.455-jdk17&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.