chore(findings): solutions-delivery-platform/openshift/helm
Summary
solutions-delivery-platform/openshift/helm has 293 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CCE-85902-5 | oscap_comp | High | |
CCE-85897-7 | oscap_comp | Medium | |
CCE-85870-4 | oscap_comp | Medium | |
CCE-85899-3 | oscap_comp | Medium | |
CCE-86233-4 | oscap_comp | Medium | |
CCE-85987-6 | oscap_comp | Medium | |
CCE-85910-8 | oscap_comp | Medium | |
CVE-2021-38297 | twistlock_cve | Critical | go-1.16.5 |
CVE-2021-44716 | twistlock_cve | High | go-1.16.5 |
CVE-2021-41771 | twistlock_cve | High | go-1.16.5 |
CVE-2021-41772 | twistlock_cve | High | go-1.16.5 |
CVE-2021-36221 | twistlock_cve | Medium | go-1.16.5 |
CVE-2021-29923 | twistlock_cve | High | go-1.16.5 |
CVE-2021-34558 | twistlock_cve | Medium | go-1.16.5 |
CVE-2021-38297 | twistlock_cve | Critical | go-1.16.6 |
CVE-2021-44716 | twistlock_cve | High | go-1.16.6 |
CVE-2021-41771 | twistlock_cve | High | go-1.16.6 |
CVE-2021-41772 | twistlock_cve | High | go-1.16.6 |
CVE-2021-36221 | twistlock_cve | Medium | go-1.16.6 |
CVE-2021-29923 | twistlock_cve | High | go-1.16.6 |
CCE-80667-9 | oscap_comp | Medium | |
CCE-80668-7 | oscap_comp | Medium | |
CCE-80669-5 | oscap_comp | Medium | |
CCE-80670-3 | oscap_comp | Medium | |
CCE-81037-4 | oscap_comp | Medium | |
CCE-81035-8 | oscap_comp | Medium | |
CVE-2022-23806 | twistlock_cve | Critical | go-1.16.5 |
CVE-2022-23806 | twistlock_cve | Critical | go-1.16.6 |
CVE-2022-23773 | twistlock_cve | High | go-1.16.6 |
CVE-2022-23773 | twistlock_cve | High | go-1.16.5 |
CVE-2022-23772 | twistlock_cve | High | go-1.16.6 |
CVE-2022-23772 | twistlock_cve | High | go-1.16.5 |
CVE-2021-41092 | twistlock_cve | Medium | github.com/docker/cli-v20.10.5 |
CVE-2022-24921 | twistlock_cve | High | go-1.16.6 |
CVE-2022-24921 | twistlock_cve | High | go-1.16.5 |
CVE-2017-14166 | anchore_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2017-14501 | anchore_cve | Low | libarchive-3.3.3-3.el8_5 |
CCE-86377-9 | oscap_comp | Medium | |
CCE-84254-2 | oscap_comp | Medium | |
CVE-2022-24675 | twistlock_cve | High | go-1.16.6 |
CVE-2022-24675 | twistlock_cve | High | go-1.16.5 |
CVE-2020-27534 | anchore_cve | Medium | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
GHSA-crp2-qrr5-8pq7 | anchore_cve | High | github.com/containerd/containerd-v1.4.4 |
GHSA-c72p-9xmj-rx3w | anchore_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2019-5736 | anchore_cve | High | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
GHSA-6635-c626-vj4r | anchore_cve | Critical | github.com/Masterminds/vcs-v1.13.1 |
GHSA-77vh-xpmg-72qh | anchore_cve | Low | github.com/opencontainers/image-spec-v1.0.1 |
GHSA-gp4j-w3vj-7299 | anchore_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
GHSA-qq97-vm5h-rrhg | anchore_cve | Low | github.com/docker/distribution-v0.0.0-20191216044856-a8371794149d |
GHSA-v95c-p5hm-xq8f | anchore_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
GHSA-c2h3-6mxw-7mvq | anchore_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2021-22570 | anchore_cve | Medium | google.golang.org/protobuf-v1.25.0 |
CVE-2022-21698 | anchore_cve | High | github.com/prometheus/client_golang-v1.7.1 |
GHSA-5j5w-g665-5m35 | anchore_cve | Low | github.com/containerd/containerd-v1.4.4 |
CVE-2019-13139 | anchore_cve | High | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
CVE-2019-16884 | anchore_cve | High | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
GHSA-g54h-m393-cpwq | anchore_cve | Low | github.com/opencontainers/runc-v0.1.1 |
CVE-2015-5237 | anchore_cve | High | google.golang.org/protobuf-v1.25.0 |
CVE-2019-13509 | anchore_cve | High | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
CVE-2018-10892 | anchore_cve | Medium | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
CVE-2021-21285 | anchore_cve | Medium | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
GHSA-fgv8-vj5c-2ppq | anchore_cve | High | github.com/opencontainers/runc-v0.1.1 |
CVE-2021-21284 | anchore_cve | Medium | github.com/docker/docker-v17.12.0-ce-rc1.0.20200618181300-9dc6525e6118+incompatible |
GHSA-c3xm-pvg7-gh7r | anchore_cve | High | github.com/opencontainers/runc-v0.1.1 |
CVE-2022-28327 | twistlock_cve | High | go-1.16.5 |
CVE-2022-28327 | twistlock_cve | High | go-1.16.6 |
CVE-2021-35938 | anchore_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35939 | anchore_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2022-1304 | anchore_cve | Medium | libcom_err-1.45.6-4.el8 |
CVE-2021-35939 | anchore_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35939 | anchore_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35937 | anchore_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2021-35937 | anchore_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35938 | anchore_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35937 | anchore_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2021-35939 | anchore_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2021-35938 | anchore_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2021-35937 | anchore_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35938 | anchore_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2021-44568 | anchore_cve | Low | libsolv-0.7.20-1.el8 |
GHSA-f3fp-gc8g-vw66 | anchore_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
addbb93c22e9b0988b8b40392a4538cb | anchore_comp | Low | |
GHSA-5ffw-gxpp-mxpf | anchore_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2022-21235 | twistlock_cve | Critical | github.com/Masterminds/vcs-v1.13.1 |
CVE-2022-23648 | twistlock_cve | High | github.com/containerd/containerd-v1.4.4 |
CVE-2021-30465 | twistlock_cve | High | github.com/opencontainers/runc-v0.1.1 |
CVE-2019-16884 | twistlock_cve | High | github.com/opencontainers/runc-v0.1.1 |
CVE-2022-31030 | twistlock_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2022-29162 | twistlock_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
CVE-2021-43784 | twistlock_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
CVE-2021-41103 | twistlock_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2021-32760 | twistlock_cve | Medium | github.com/containerd/containerd-v1.4.4 |
CVE-2016-9962 | twistlock_cve | Medium | github.com/opencontainers/runc-v0.1.1 |
GHSA-qq97-vm5h-rrhg | twistlock_cve | Low | github.com/docker/distribution-v2.7.1 |
GHSA-g54h-m393-cpwq | twistlock_cve | Low | github.com/opencontainers/runc-v0.1.1 |
GHSA-77vh-xpmg-72qh | twistlock_cve | Low | github.com/opencontainers/image-spec-v1.0.1 |
GHSA-5j5w-g665-5m35 | twistlock_cve | Low | github.com/containerd/containerd-v1.4.4 |
CVE-2022-27943 | anchore_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2022-27943 | anchore_cve | Low | libgcc-8.5.0-10.1.el8_6 |
GHSA-7jr6-prv4-5wf5 | anchore_cve | Medium | helm.sh/helm/v3-(devel) |
GHSA-56hp-xqp3-w2jf | anchore_cve | Medium | helm.sh/helm/v3-(devel) |
CVE-2021-46828 | anchore_cve | Medium | libtirpc-1.1.4-6.el8 |
CVE-2022-2509 | anchore_cve | Medium | gnutls-3.6.16-4.el8 |
CVE-2022-2344 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2129 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2126 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2125 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2345 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2124 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2343 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2175 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-37434 | anchore_cve | Medium | zlib-1.2.11-18.el8_5 |
CVE-2022-30698 | anchore_cve | Medium | unbound-libs-1.7.3-17.el8 |
CVE-2022-30699 | anchore_cve | Medium | python3-unbound-1.7.3-17.el8 |
CVE-2022-30698 | anchore_cve | Medium | python3-unbound-1.7.3-17.el8 |
CVE-2022-2522 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-30699 | anchore_cve | Medium | unbound-libs-1.7.3-17.el8 |
CVE-2022-30580 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30580 | twistlock_cve | High | go-1.16.6 |
CVE-2022-32189 | twistlock_cve | High | go-1.16.5 |
CVE-2022-32189 | twistlock_cve | High | go-1.16.6 |
CVE-2022-30635 | twistlock_cve | High | go-1.16.6 |
CVE-2022-30635 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30633 | twistlock_cve | High | go-1.16.6 |
CVE-2022-30633 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30632 | twistlock_cve | High | go-1.16.6 |
CVE-2022-30632 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30631 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30631 | twistlock_cve | High | go-1.16.6 |
CVE-2022-30630 | twistlock_cve | High | go-1.16.5 |
CVE-2022-30630 | twistlock_cve | High | go-1.16.6 |
CVE-2022-28131 | twistlock_cve | High | go-1.16.6 |
CVE-2022-28131 | twistlock_cve | High | go-1.16.5 |
CVE-2022-32148 | twistlock_cve | Medium | go-1.16.5 |
CVE-2022-32148 | twistlock_cve | Medium | go-1.16.6 |
CCE-88248-0 | oscap_comp | Medium | |
CCE-86107-0 | oscap_comp | Medium | |
CVE-2022-2175 | twistlock_cve | Critical | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-30629 | twistlock_cve | Low | go-1.16.5 |
CVE-2022-30629 | twistlock_cve | Low | go-1.16.6 |
CVE-2017-15412 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2016-5131 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2017-0663 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-2183 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2182 | twistlock_cve | Medium | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2509 | twistlock_cve | Medium | gnutls-3.6.16-4.el8 |
CVE-2017-9047 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-2207 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2020-17049 | twistlock_cve | Medium | krb5-libs-1.18.2-14.el8 |
CVE-2022-37434 | twistlock_cve | Medium | zlib-1.2.11-18.el8_5 |
CVE-2022-30699 | twistlock_cve | Medium | python3-unbound-1.7.3-17.el8 |
CVE-2022-30699 | twistlock_cve | Medium | unbound-libs-1.7.3-17.el8 |
CVE-2022-30698 | twistlock_cve | Medium | unbound-libs-1.7.3-17.el8 |
CVE-2022-30698 | twistlock_cve | Medium | python3-unbound-1.7.3-17.el8 |
CVE-2022-1705 | twistlock_cve | Medium | go-1.16.6 |
CVE-2022-1705 | twistlock_cve | Medium | go-1.16.5 |
CVE-2021-35939 | twistlock_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35939 | twistlock_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2021-35939 | twistlock_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2021-35939 | twistlock_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35938 | twistlock_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35938 | twistlock_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2021-35938 | twistlock_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35938 | twistlock_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2017-9050 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2017-9049 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2017-7375 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2021-35937 | twistlock_cve | Medium | rpm-4.14.3-23.el8 |
CVE-2021-35937 | twistlock_cve | Medium | rpm-build-libs-4.14.3-23.el8 |
CVE-2021-35937 | twistlock_cve | Medium | python3-rpm-4.14.3-23.el8 |
CVE-2021-35937 | twistlock_cve | Medium | rpm-libs-4.14.3-23.el8 |
CVE-2022-2206 | twistlock_cve | Medium | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-0235 | twistlock_cve | Medium | subscription-manager-rhsm-certificates-1.28.13-2.el8 |
CVE-2022-0235 | twistlock_cve | Medium | dnf-plugin-subscription-manager-1.28.13-2.el8 |
CVE-2022-0235 | twistlock_cve | Medium | python3-subscription-manager-rhsm-1.28.13-2.el8 |
CVE-2022-0235 | twistlock_cve | Medium | python3-syspurpose-1.28.13-2.el8 |
CVE-2022-0235 | twistlock_cve | Medium | subscription-manager-1.28.13-2.el8 |
CVE-2016-3709 | twistlock_cve | Medium | libxml2-2.9.7-13.el8_6.1 |
CVE-2016-3709 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-1304 | twistlock_cve | Medium | libcom_err-1.45.6-4.el8 |
CVE-2022-2231 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-1962 | twistlock_cve | Medium | go-1.16.5 |
CVE-2022-1962 | twistlock_cve | Medium | go-1.16.6 |
CVE-2022-2210 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2016-4658 | twistlock_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2018-16428 | twistlock_cve | Low | glib2-2.56.4-158.el8 |
CVE-2022-2345 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2344 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2343 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2020-21674 | twistlock_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2021-3927 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2021-4166 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2020-35512 | twistlock_cve | Low | dbus-common-1.12.8-18.el8_6.1 |
CVE-2020-35512 | twistlock_cve | Low | dbus-daemon-1.12.8-18.el8_6.1 |
CVE-2020-35512 | twistlock_cve | Low | dbus-1.12.8-18.el8_6.1 |
CVE-2020-35512 | twistlock_cve | Low | dbus-libs-1.12.8-18.el8_6.1 |
CVE-2020-35512 | twistlock_cve | Low | dbus-tools-1.12.8-18.el8_6.1 |
CVE-2022-2522 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-0351 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2021-4209 | twistlock_cve | Low | gnutls-3.6.16-4.el8 |
CVE-2021-44568 | twistlock_cve | Low | libsolv-0.7.20-1.el8 |
CVE-2021-43618 | twistlock_cve | Low | gmp-6.1.2-10.el8 |
CVE-2022-2129 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2819 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-27943 | twistlock_cve | Low | libgcc-8.5.0-10.1.el8_6 |
CVE-2022-27943 | twistlock_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2022-1720 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2288 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2018-20786 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2017-9048 | twistlock_cve | Low | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-2289 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2286 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2285 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2284 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-1619 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2017-18258 | twistlock_cve | Low | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-2287 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2208 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2126 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2125 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2124 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2021-46195 | twistlock_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2021-46195 | twistlock_cve | Low | libgcc-8.5.0-10.1.el8_6 |
CVE-2019-14250 | twistlock_cve | Low | libgcc-8.5.0-10.1.el8_6 |
CVE-2019-14250 | twistlock_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2018-20657 | twistlock_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2018-20657 | twistlock_cve | Low | libgcc-8.5.0-10.1.el8_6 |
CVE-2018-1000880 | twistlock_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2018-1000879 | twistlock_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2017-14501 | twistlock_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2017-14166 | twistlock_cve | Low | libarchive-3.3.3-3.el8_5 |
CVE-2021-3974 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2016-3709 | anchore_cve | Medium | libxml2-2.9.7-13.el8_6.1 |
CVE-2016-3709 | anchore_cve | Medium | python3-libxml2-2.9.7-13.el8_6.1 |
CVE-2022-2845 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2946 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2923 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-2182 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2819 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2022-2849 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2020-35527 | twistlock_cve | Medium | sqlite-libs-3.26.0-15.el8 |
CVE-2020-35525 | twistlock_cve | Low | sqlite-libs-3.26.0-15.el8 |
CVE-2021-3826 | twistlock_cve | Low | libstdc++-8.5.0-10.1.el8_6 |
CVE-2021-3826 | twistlock_cve | Low | gdb-gdbserver-8.2-18.el8 |
CVE-2021-3826 | twistlock_cve | Low | libgcc-8.5.0-10.1.el8_6 |
GHSA-7hfp-qfw3-5jxh | anchore_cve | Medium | helm.sh/helm/v3-(devel) |
CVE-2022-35252 | anchore_cve | Low | libcurl-7.61.1-22.el8_6.4 |
CVE-2020-35527 | anchore_cve | Medium | sqlite-libs-3.26.0-15.el8 |
CVE-2020-35525 | anchore_cve | Low | sqlite-libs-3.26.0-15.el8 |
CVE-2022-35252 | anchore_cve | Low | curl-7.61.1-22.el8_6.4 |
CVE-2022-39046 | twistlock_cve | Medium | glibc-2.28-189.5.el8_6 |
CVE-2022-39046 | twistlock_cve | Medium | glibc-common-2.28-189.5.el8_6 |
CVE-2022-39046 | twistlock_cve | Medium | glibc-minimal-langpack-2.28-189.5.el8_6 |
CVE-2022-39046 | twistlock_cve | Medium | glibc-langpack-en-2.28-189.5.el8_6 |
CVE-2022-3037 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-35252 | twistlock_cve | Low | libcurl-7.61.1-22.el8_6.4 |
CVE-2022-35252 | twistlock_cve | Low | curl-7.61.1-22.el8_6.4 |
CVE-2022-2980 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-27664 | twistlock_cve | High | go-1.16.5 |
CVE-2022-27664 | twistlock_cve | High | go-1.16.6 |
CVE-2022-3153 | twistlock_cve | Low | vim-minimal-8.0.1763-19.el8_6.4 |
CVE-2022-3153 | anchore_cve | Low | vim-minimal-2:8.0.1763-19.el8_6.4 |
CVE-2020-10735 | twistlock_cve | Medium | platform-python-3.6.8-47.el8_6 |
CVE-2020-10735 | twistlock_cve | Medium | python3-libs-3.6.8-47.el8_6 |
CVE-2018-20839 | twistlock_cve | Medium | systemd-libs-239-58.el8_6.7 |
CVE-2018-20839 | twistlock_cve | Medium | systemd-239-58.el8_6.7 |
CVE-2018-20839 | twistlock_cve | Medium | systemd-pam-239-58.el8_6.7 |
CVE-2019-9674 | twistlock_cve | Low | python3-libs-3.6.8-47.el8_6 |
CVE-2019-9674 | twistlock_cve | Low | platform-python-3.6.8-47.el8_6 |
CVE-2020-12413 | twistlock_cve | Low | nss-sysinit-3.79.0-10.el8_6 |
CVE-2020-12413 | twistlock_cve | Low | nss-softokn-3.79.0-10.el8_6 |
CVE-2020-12413 | twistlock_cve | Low | nss-3.79.0-10.el8_6 |
CVE-2020-12413 | twistlock_cve | Low | nss-util-3.79.0-10.el8_6 |
CVE-2020-12413 | twistlock_cve | Low | nss-softokn-freebl-3.79.0-10.el8_6 |
CVE-2018-20406 | twistlock_cve | Low | python3-libs-3.6.8-47.el8_6 |
CVE-2018-20406 | twistlock_cve | Low | platform-python-3.6.8-47.el8_6 |
CVE-2021-3997 | twistlock_cve | Low | systemd-libs-239-58.el8_6.7 |
CVE-2021-3997 | twistlock_cve | Low | systemd-pam-239-58.el8_6.7 |
CVE-2021-3997 | twistlock_cve | Low | systemd-239-58.el8_6.7 |
CVE-2021-28861 | anchore_cve | Medium | python3-libs-3.6.8-47.el8_6 |
CVE-2015-20107 | anchore_cve | Medium | platform-python-3.6.8-47.el8_6 |
CVE-2022-0391 | anchore_cve | Medium | platform-python-3.6.8-47.el8_6 |
CVE-2015-20107 | anchore_cve | Medium | python3-libs-3.6.8-47.el8_6 |
CVE-2022-34903 | anchore_cve | Medium | gnupg2-smime-2.2.20-3.el8_6 |
CVE-2021-28861 | anchore_cve | Medium | platform-python-3.6.8-47.el8_6 |
CVE-2020-10735 | anchore_cve | Medium | python3-libs-3.6.8-47.el8_6 |
CVE-2022-0391 | anchore_cve | Medium | python3-libs-3.6.8-47.el8_6 |
CVE-2020-10735 | anchore_cve | Medium | platform-python-3.6.8-47.el8_6 |
CVE-2022-34903 | anchore_cve | Medium | gnupg2-2.2.20-3.el8_6 |
CVE-2022-3219 | twistlock_cve | Low | gnupg2-smime-2.2.20-3.el8_6 |
CVE-2022-3219 | twistlock_cve | Low | gnupg2-2.2.20-3.el8_6 |
CVE-2022-3219 | anchore_cve | Low | gnupg2-2.2.20-3.el8_6 |
CVE-2022-3219 | anchore_cve | Low | gnupg2-smime-2.2.20-3.el8_6 |
VAT: https://vat.dso.mil/vat/container/15516?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/solutions-delivery-platform/openshift/helm/-/jobs/9120061
Definition of Done
Justifications:
-
All findings have been justified -
Justifications have been provided to the container hardening team
Approval Process:
-
Findings Approver has reviewed and approved all justifications -
Approval request has been sent to Authorizing Official -
Approval request has been processed by Authorizing Official
Edited by Ghost User