UNCLASSIFIED - NO CUI

Skip to content

chore(findings): opensource/weaveworks/weavenet

Summary

opensource/weaveworks/weavenet has 39 new findings discovered during continuous monitoring.

id source severity package
CVE-2024-24806 Anchore CVE Medium libuv-1:1.42.0-1.el9
CCE-90308-8 OSCAP Compliance High
CCE-83611-4 OSCAP Compliance High
CVE-2023-6516 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-6516 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-6516 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2023-5679 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-5679 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2023-5679 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-5517 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-5517 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-5517 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2023-50868 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-50868 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2023-50868 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-50387 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2023-50387 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-50387 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-4408 Twistlock CVE Critical bind-utils-9.16.23-14.el9_3
CVE-2023-4408 Twistlock CVE Critical bind-libs-9.16.23-14.el9_3
CVE-2023-4408 Twistlock CVE Critical bind-license-9.16.23-14.el9_3
CVE-2022-21698 Twistlock CVE High github.com/prometheus/client_golang/prometheus/promhttp-v1.7.1
CVE-2024-24806 Twistlock CVE Medium libuv-1.42.0-1.el9
CVE-2023-7008 Twistlock CVE Medium systemd-252-18.el9
CVE-2023-7008 Twistlock CVE Medium systemd-rpm-macros-252-18.el9
CVE-2023-7008 Twistlock CVE Medium systemd-pam-252-18.el9
CVE-2024-22365 Twistlock CVE Medium pam-1.5.1-15.el9
CVE-2021-3997 Twistlock CVE Medium systemd-rpm-macros-252-18.el9
CVE-2021-3997 Twistlock CVE Medium systemd-252-18.el9
CVE-2021-3997 Twistlock CVE Medium systemd-pam-252-18.el9
CVE-2023-6129 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2023-6237 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2024-0727 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2023-5678 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2023-3817 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2023-3446 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2023-2975 Twistlock CVE Low openssl-3.0.7-25.el9_3
CVE-2024-25260 Twistlock CVE Low elfutils-libelf-0.189-3.el9
GO-2022-0379 Twistlock CVE Low github.com/docker/distribution-v2.6.0-rc.1.0.20180327202408-83389a148052

VAT: https://vat.dso.mil/vat/image?imageName=opensource/weaveworks/weavenet&tag=2.8.1-ubi9&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/weaveworks/weavenet&tag=2.8.1-ubi9&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information