UNCLASSIFIED - NO CUI

Skip to content

chore(findings): opensource/minio/console-v0.6.8

Summary

opensource/minio/console-v0.6.8 has 110 new findings discovered during continuous monitoring.

id source severity package
GHSA-r48q-9g5r-8q2h Anchore CVE Critical github.com/emicklei/go-restful-v2.9.5+incompatible
CVE-2018-1000538 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-4374-p667-p6c8 Anchore CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
GHSA-69ch-w2m2-3vjp Anchore CVE High golang.org/x/text-v0.3.4
GHSA-wf43-55jj-vwq8 Anchore CVE Medium go.etcd.io/etcd-v0.5.0-alpha.5.0.20200910180754-dd1b699fc489
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium google.golang.org/grpc-v1.29.1
GHSA-h86h-8ppg-mxmh Anchore CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
GHSA-m425-mq94-257g Anchore CVE High google.golang.org/grpc-v1.29.1
GHSA-8c26-wmh5-6g9v Anchore CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
CVE-2020-11012 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
CVE-2023-28433 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-hp87-p4gw-j4gq Anchore CVE High gopkg.in/yaml.v3-v3.0.0-20200615113413-eeeca48fe776
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
GHSA-gwc9-m7rh-j2ww Anchore CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
GHSA-p782-xgp4-8hr8 Anchore CVE Medium golang.org/x/sys-v0.0.0-20210119212857-b64e53b001e4
GHSA-2wrh-6pvc-2jm9 Anchore CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
GHSA-83g2-8m93-v3w7 Anchore CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2021-21287 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-69cg-p879-7622 Anchore CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2021-21362 Anchore CVE Medium github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
CVE-2021-21390 Anchore CVE Medium github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
CVE-2021-43858 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-f6mq-5m25-4r72 Anchore CVE Medium go.mongodb.org/mongo-driver-v1.3.4
GHSA-3vm4-22fp-5rfm Anchore CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
GHSA-ppp9-7jff-5vj2 Anchore CVE High golang.org/x/text-v0.3.4
CVE-2023-28434 Anchore CVE High github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-c3h9-896r-86jm Anchore CVE High github.com/gogo/protobuf-v1.3.1
CVE-2022-35919 Anchore CVE Low github.com/minio/minio-v0.0.0-20210301203133-e8d8dfa3ae8f
GHSA-vvpx-j8f3-3w6h Anchore CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CCE-88048-4 OSCAP Compliance Medium
CCE-83639-5 OSCAP Compliance Medium
CVE-2023-39323 Twistlock CVE Critical go-1.16.3
CVE-2023-29405 Twistlock CVE Critical go-1.16.3
CVE-2023-29404 Twistlock CVE Critical go-1.16.3
CVE-2023-29402 Twistlock CVE Critical go-1.16.3
CVE-2023-24540 Twistlock CVE Critical go-1.16.3
CVE-2023-24538 Twistlock CVE Critical go-1.16.3
CVE-2021-38297 Twistlock CVE Critical go-1.16.3
CVE-2022-23806 Twistlock CVE Critical go-1.16.3
CVE-2022-1996 Twistlock CVE Critical github.com/emicklei/go-restful-v2.9.5
CVE-2021-3121 Twistlock CVE High github.com/gogo/protobuf-v1.3.1
CVE-2023-29403 Twistlock CVE High go-1.16.3
CVE-2022-30580 Twistlock CVE High go-1.16.3
GHSA-m425-mq94-257g Twistlock CVE High google.golang.org/grpc-v1.29.1
CVE-2023-39325 Twistlock CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2023-24537 Twistlock CVE High go-1.16.3
CVE-2023-24536 Twistlock CVE High go-1.16.3
CVE-2023-24534 Twistlock CVE High go-1.16.3
CVE-2022-41725 Twistlock CVE High go-1.16.3
CVE-2022-41724 Twistlock CVE High go-1.16.3
CVE-2022-41723 Twistlock CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2022-41723 Twistlock CVE High go-1.16.3
CVE-2022-41716 Twistlock CVE High go-1.16.3
CVE-2022-41715 Twistlock CVE High go-1.16.3
CVE-2022-32189 Twistlock CVE High go-1.16.3
CVE-2022-32149 Twistlock CVE High golang.org/x/text-v0.3.4
CVE-2022-30635 Twistlock CVE High go-1.16.3
CVE-2022-30633 Twistlock CVE High go-1.16.3
CVE-2022-30632 Twistlock CVE High go-1.16.3
CVE-2022-30631 Twistlock CVE High go-1.16.3
CVE-2022-30630 Twistlock CVE High go-1.16.3
CVE-2022-28948 Twistlock CVE High gopkg.in/yaml.v3-v3.0.0-20200615113413-eeeca48fe776
CVE-2022-2880 Twistlock CVE High go-1.16.3
CVE-2022-2879 Twistlock CVE High go-1.16.3
CVE-2022-28327 Twistlock CVE High go-1.16.3
CVE-2022-28131 Twistlock CVE High go-1.16.3
CVE-2022-27664 Twistlock CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2022-27664 Twistlock CVE High go-1.16.3
CVE-2022-27191 Twistlock CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
CVE-2022-24921 Twistlock CVE High go-1.16.3
CVE-2022-24675 Twistlock CVE High go-1.16.3
CVE-2022-23773 Twistlock CVE High go-1.16.3
CVE-2022-23772 Twistlock CVE High go-1.16.3
CVE-2021-44716 Twistlock CVE High go-1.16.3
CVE-2021-43565 Twistlock CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
CVE-2021-41772 Twistlock CVE High go-1.16.3
CVE-2021-41771 Twistlock CVE High go-1.16.3
CVE-2021-38561 Twistlock CVE High golang.org/x/text-v0.3.4
CVE-2021-33198 Twistlock CVE High go-1.16.3
CVE-2021-33196 Twistlock CVE High go-1.16.3
CVE-2021-33194 Twistlock CVE High golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2021-33194 Twistlock CVE High go-1.16.3
CVE-2021-29923 Twistlock CVE High go-1.16.3
CVE-2020-29652 Twistlock CVE High golang.org/x/crypto-v0.0.0-20201124201722-c8d3bf9c5392
CVE-2023-29400 Twistlock CVE High go-1.16.3
CVE-2023-24539 Twistlock CVE High go-1.16.3
CVE-2021-33195 Twistlock CVE High go-1.16.3
CVE-2021-20329 Twistlock CVE Medium go.mongodb.org/mongo-driver-v1.3.4
CVE-2023-29406 Twistlock CVE Medium go-1.16.3
CVE-2022-32148 Twistlock CVE Medium go-1.16.3
CVE-2022-1705 Twistlock CVE Medium go-1.16.3
CVE-2021-34558 Twistlock CVE Medium go-1.16.3
CVE-2023-3978 Twistlock CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2023-39319 Twistlock CVE Medium go-1.16.3
CVE-2023-39318 Twistlock CVE Medium go-1.16.3
CVE-2021-36221 Twistlock CVE Medium go-1.16.3
CVE-2021-31525 Twistlock CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2021-31525 Twistlock CVE Medium go-1.16.3
CVE-2020-29511 Twistlock CVE Medium go-1.16.3
CVE-2020-29509 Twistlock CVE Medium go-1.16.3
CVE-2022-1962 Twistlock CVE Medium go-1.16.3
CVE-2018-1099 Twistlock CVE Medium go.etcd.io/etcd-v0.5.0-alpha.5.0.20200910180754-dd1b699fc489
CVE-2023-44487 Twistlock CVE Medium google.golang.org/grpc-v1.29.1
CVE-2023-44487 Twistlock CVE Medium golang.org/x/net-v0.0.0-20201216054612-986b41b23924
CVE-2023-29409 Twistlock CVE Medium go-1.16.3
CVE-2023-24532 Twistlock CVE Medium go-1.16.3
CVE-2022-41717 Twistlock CVE Medium go-1.16.3
CVE-2022-29526 Twistlock CVE Medium golang.org/x/sys-v0.0.0-20210119212857-b64e53b001e4
CVE-2021-33197 Twistlock CVE Medium go-1.16.3
CVE-2022-30629 Twistlock CVE Low go-1.16.3

VAT: https://vat.dso.mil/vat/image?imageName=opensource/minio/console-v0.6.8&tag=v0.6.8-ubi9&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/minio/console-v0.6.8&tag=v0.6.8-ubi9&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information