chore(findings): redhat/go/go-toolset
Summary
redhat/go/go-toolset has 395 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2023-39323 | Anchore CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2024-26458 | Anchore CVE | Low | krb5-devel-1.18.2-26.el8_9 |
CVE-2024-26458 | Anchore CVE | Low | libkadm5-1.18.2-26.el8_9 |
CVE-2021-47136 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-4969 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26585 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47167 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52434 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-2193 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52340 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-0841 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26671 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26603 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26584 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52445 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52435 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26593 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46961 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47178 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52448 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26583 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46976 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52489 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26649 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47168 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47141 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26586 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48619 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26610 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52581 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-1151 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52439 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47142 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47177 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52477 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47166 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47164 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52578 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47163 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47138 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52626 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-24023 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52580 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47179 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47152 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52565 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52610 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47173 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47143 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-6040 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47170 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52587 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47162 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47144 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-6240 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52574 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47140 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52560 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52568 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-26558 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47176 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26763 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-3894 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26688 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26718 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26703 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26742 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52607 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26621 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46905 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52606 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26609 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26595 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-25742 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-25743 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-39323 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2023-45287 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2023-45287 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2024-26461 | Twistlock CVE | Low | krb5-devel-1.18.2-26.el8_9 |
CVE-2024-26461 | Twistlock CVE | Low | libkadm5-1.18.2-26.el8_9 |
CVE-2024-26458 | Twistlock CVE | Low | krb5-devel-1.18.2-26.el8_9 |
CVE-2024-26458 | Twistlock CVE | Low | libkadm5-1.18.2-26.el8_9 |
CVE-2024-0727 | Twistlock CVE | Low | openssl-devel-1.1.1k-12.el8_9 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-utf16-10.32-3.el8_6 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-devel-10.32-3.el8_6 |
CVE-2022-41409 | Twistlock CVE | Low | pcre2-utf32-10.32-3.el8_6 |
CVE-2024-24785 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2024-24785 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2024-24783 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2024-24783 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2024-24784 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2024-24784 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2023-45290 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2023-45290 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2023-45289 | Twistlock CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2023-45289 | Twistlock CVE | Medium | delve-1.20.2-1.module+el8.9.0+18926+5193682d |
CVE-2024-26461 | Anchore CVE | Low | libkadm5-1.18.2-26.el8_9 |
CVE-2024-26461 | Anchore CVE | Low | krb5-devel-1.18.2-26.el8_9 |
CVE-2024-2511 | Anchore CVE | Low | openssl-devel-1:1.1.1k-12.el8_9 |
CVE-2024-2201 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47219 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47184 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26689 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47182 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47201 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47217 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47213 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47183 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47196 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47203 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47186 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-17049 | Anchore CVE | Medium | libkadm5-1.18.2-26.el8_9 |
CVE-2021-47191 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-17049 | Anchore CVE | Medium | krb5-devel-1.18.2-26.el8_9 |
CVE-2021-47194 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47199 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47197 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47209 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-45287 | Anchore CVE | Medium | go-toolset-1.20.12-1.module+el8.9.0+21033+5795bdf6 |
CVE-2021-47212 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47210 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47211 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47198 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47192 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47218 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47215 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47044 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47036 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47024 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47038 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52614 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26860 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26830 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-2961 | Anchore CVE | High | glibc-devel-2.28-236.el8_9.12 |
CVE-2023-52619 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-2961 | Anchore CVE | High | glibc-headers-2.28-236.el8_9.12 |
CVE-2023-52513 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47171 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46963 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47185 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26772 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52615 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52516 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46939 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26740 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47097 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52620 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-25744 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26643 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47118 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52458 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47055 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-45288 | Anchore CVE | High | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2022-23806 | Anchore CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2022-23806 | Anchore CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-39323 | Anchore CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-39323 | Anchore CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45288 | Anchore CVE | High | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45287 | Anchore CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-39323 | Anchore CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45287 | Anchore CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45287 | Anchore CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2022-23806 | Anchore CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45288 | Anchore CVE | High | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-52464 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26686 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26691 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-46975 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26698 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52639 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26897 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26852 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26700 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26656 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52475 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47013 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26826 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52530 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-33602 | Anchore CVE | Low | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33602 | Anchore CVE | Low | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-33601 | Anchore CVE | Low | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-26804 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26735 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-26855 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26801 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-33599 | Anchore CVE | High | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-33599 | Anchore CVE | High | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33601 | Anchore CVE | Low | glibc-devel-2.28-236.el8_9.12 |
CVE-2022-48631 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48647 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48637 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48651 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48658 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48662 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48634 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48639 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48633 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48648 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48650 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48635 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48659 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26845 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48666 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48642 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48653 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26853 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48646 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48640 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48652 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-48638 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26828 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-6872 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2023-3358 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-17360 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-9075 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2020-29509 | Anchore CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-52522 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-12699 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-20657 | Anchore CVE | Low | gcc-8.5.0-20.el8 |
CVE-2020-35493 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-15594 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-14250 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-18309 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-9077 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2018-20657 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2023-52570 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-7042 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-29509 | Anchore CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-6486 | Anchore CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2022-3606 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-41409 | Anchore CVE | Low | pcre2-utf32-10.32-3.el8_6 |
CVE-2021-42694 | Anchore CVE | Medium | gcc-8.5.0-20.el8 |
CVE-2023-52454 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-20673 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2019-19083 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19066 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-20657 | Anchore CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2024-26810 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-18701 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-13844 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47116 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-devel-2.28-236.el8_9.12 |
CVE-2021-47041 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-14250 | Anchore CVE | Low | libgomp-8.5.0-20.el8 |
CVE-2019-15807 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-2650 | Anchore CVE | Medium | openssl-devel-1:1.1.1k-12.el8_9 |
CVE-2019-14250 | Anchore CVE | Low | gcc-8.5.0-20.el8 |
CVE-2020-11609 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26695 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47120 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-12698 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-16230 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-2511 | Twistlock CVE | Low | openssl-devel-1.1.1k-12.el8_9 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-headers-2.28-236.el8_9.12 |
CVE-2023-39323 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-39323 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-39323 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-6486 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-6486 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-6486 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24785 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24785 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24785 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24783 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24783 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24783 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24784 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24784 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-24784 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45290 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45290 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45290 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45289 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45289 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45289 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29511 | Twistlock CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29511 | Twistlock CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29511 | Twistlock CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29510 | Twistlock CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29510 | Twistlock CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29510 | Twistlock CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29509 | Twistlock CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29509 | Twistlock CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29509 | Twistlock CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33599 | Twistlock CVE | Critical | glibc-headers-2.28-236.el8_9.12 |
CVE-2023-45287 | Twistlock CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45287 | Twistlock CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-45287 | Twistlock CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-33600 | Twistlock CVE | Medium | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-headers-2.28-236.el8_9.12 |
CVE-2024-33602 | Twistlock CVE | Low | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-devel-2.28-236.el8_9.12 |
CVE-2024-33601 | Twistlock CVE | Low | glibc-headers-2.28-236.el8_9.12 |
CVE-2023-25584 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-10021 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-17985 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2022-41409 | Anchore CVE | Low | pcre2-utf16-10.32-3.el8_6 |
CVE-2021-46929 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19965 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19081 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-42694 | Anchore CVE | Medium | cpp-8.5.0-20.el8 |
CVE-2018-18606 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-20671 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2019-15291 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-20651 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-35495 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-17794 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2021-42574 | Anchore CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-47233 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26747 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-29510 | Anchore CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-25588 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2021-47130 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52452 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-25639 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-0564 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-14250 | Anchore CVE | Low | cpp-8.5.0-20.el8 |
CVE-2024-26812 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-29511 | Anchore CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-52478 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-35496 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-19039 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-38199 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2022-3344 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19080 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-42574 | Anchore CVE | Medium | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-9071 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-19082 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-1000876 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2018-18605 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2024-27437 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-29510 | Anchore CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2019-6486 | Anchore CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2024-0727 | Anchore CVE | Low | openssl-devel-1:1.1.1k-12.el8_9 |
CVE-2019-18806 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-17977 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-12641 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-19932 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-8043 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19462 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-8694 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-18483 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-12697 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2018-20002 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2021-47134 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-45078 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2019-2054 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-16089 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-15218 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-18607 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-29511 | Anchore CVE | Low | golang-src-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2021-46926 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19076 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-10781 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-19054 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-42574 | Anchore CVE | Medium | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29511 | Anchore CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2020-29510 | Anchore CVE | Low | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2023-25585 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-14304 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-35507 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2022-41409 | Anchore CVE | Low | pcre2-devel-10.32-3.el8_6 |
CVE-2020-29509 | Anchore CVE | Low | golang-bin-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2021-47128 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-0607 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-16862 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47045 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2024-26687 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-12934 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-12380 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-12700 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-12769 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-42694 | Anchore CVE | Medium | libgomp-8.5.0-20.el8 |
CVE-2018-18484 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-16229 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2019-15217 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-11494 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2018-20657 | Anchore CVE | Low | cpp-8.5.0-20.el8 |
CVE-2019-12972 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2020-35494 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-6486 | Anchore CVE | Medium | golang-1.20.12-8.module+el8.9.0+21735+6a7c8cc8 |
CVE-2018-20623 | Anchore CVE | Medium | binutils-2.30-123.el8 |
CVE-2018-7273 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2021-47133 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-16598 | Anchore CVE | Low | binutils-2.30-123.el8 |
CVE-2019-1010022 | Anchore CVE | Critical | glibc-headers-2.28-236.el8_9.12 |
CVE-2019-11184 | Anchore CVE | Medium | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2020-12768 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-52447 | Anchore CVE | Low | kernel-headers-4.18.0-513.24.1.el8_9 |
CVE-2023-1972 | Anchore CVE | Low | binutils-2.30-123.el8 |
VAT: https://vat.dso.mil/vat/image?imageName=redhat/go/go-toolset&tag=1.20.12&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=redhat/go/go-toolset&tag=1.20.10&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.