chore(findings): redhat/go/go-toolset
Summary
redhat/go/go-toolset has 149 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.10 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.1 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.1 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-4128 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-29409 | Anchore CVE | Medium | golang-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-24532 | Anchore CVE | Medium | golang-bin-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-24532 | Anchore CVE | Medium | golang-src-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-3446 | Anchore CVE | Low | openssl-devel-1:1.1.1k-9.el8_7 |
CVE-2023-29406 | Anchore CVE | Medium | golang-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-4133 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4387 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-38409 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-20569 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-29406 | Anchore CVE | Medium | golang-src-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-4004 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4194 | Anchore CVE | Low | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4132 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-3812 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-40982 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-24532 | Anchore CVE | Medium | golang-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-4155 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-3773 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-29409 | Anchore CVE | Medium | golang-bin-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-3817 | Anchore CVE | Low | openssl-devel-1:1.1.1k-9.el8_7 |
CVE-2023-3609 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-3640 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-29406 | Anchore CVE | Medium | golang-bin-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-4010 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-29409 | Anchore CVE | Medium | golang-src-1.19.10-1.module+el8.8.0+19203+782922b7 |
CVE-2023-3776 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-3772 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-37453 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-3611 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4459 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-40283 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-25775 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-48063 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-41804 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-47696 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-45703 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-21490 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-44840 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47695 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2021-46174 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35206 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47008 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2023-20583 | Anchore CVE | Low | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-48064 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35205 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19724 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35342 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48065 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47010 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47007 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47673 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47011 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19726 | Anchore CVE | Low | binutils-2.30-119.el8 |
CVE-2023-23908 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4563 | Anchore CVE | Low | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2021-34866 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-23222 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-19536 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-15505 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-15794 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-0264 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2021-20320 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-19535 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-3424 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-2905 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-20166 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-1192 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2021-4204 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-13631 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2021-40490 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-14283 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-26555 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-2785 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-15802 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-27418 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-12656 | Anchore CVE | Low | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-10135 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-3534 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2021-3753 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2020-25656 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-19529 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2019-20794 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4622 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4244 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2022-4744 | Anchore CVE | High | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4207 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-4206 | Anchore CVE | Medium | kernel-headers-4.18.0-477.21.1.el8_8 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2023-39533 | Twistlock CVE | High | go-1.19.10 |
CVE-2022-48065 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48064 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-48063 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47696 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47695 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47673 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47011 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47010 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47008 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-47007 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-45703 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-44840 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35206 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2022-35205 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2021-46174 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-35342 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-21490 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19726 | Twistlock CVE | Low | binutils-2.30-119.el8 |
CVE-2020-19724 | Twistlock CVE | Low | binutils-2.30-119.el8 |
VAT: https://vat.dso.mil/vat/image?imageName=redhat/go/go-toolset&tag=1.19.10&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=redhat/go/go-toolset&tag=1.19.10&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.