chore(findings): sonarsource/sonar-scanner-cli
Summary
sonarsource/sonar-scanner-cli has 55 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CCE-85987-6 | oscap_comp | Medium | |
CVE-2015-20107 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2020-28469 | anchore_cve | Medium | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-28469 | anchore_cve | Medium | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-28469 | anchore_cve | Medium | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-28469 | anchore_cve | Medium | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2020-7788 | anchore_cve | Medium | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-7788 | anchore_cve | Medium | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-7788 | anchore_cve | Medium | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2020-7788 | anchore_cve | Medium | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22959 | anchore_cve | Low | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22959 | anchore_cve | Low | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22959 | anchore_cve | Low | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22959 | anchore_cve | Low | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22960 | anchore_cve | Low | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22960 | anchore_cve | Low | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22960 | anchore_cve | Low | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-22960 | anchore_cve | Low | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-33502 | anchore_cve | Medium | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-33502 | anchore_cve | Medium | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-33502 | anchore_cve | Medium | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-33502 | anchore_cve | Medium | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3807 | anchore_cve | Medium | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3807 | anchore_cve | Medium | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3807 | anchore_cve | Medium | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3807 | anchore_cve | Medium | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3918 | anchore_cve | High | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3918 | anchore_cve | High | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3918 | anchore_cve | High | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-3918 | anchore_cve | High | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-43616 | anchore_cve | High | nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-43616 | anchore_cve | High | nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-43616 | anchore_cve | High | nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2021-43616 | anchore_cve | High | npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2021-44906 | twistlock_cve | Critical | minimist-1.2.5 |
CVE-2022-0391 | twistlock_cve | Medium | python36-3.6.8-38.module+el8.5.0+12207+5c5719bc |
CVE-2022-1292 | anchore_cve | Medium | openssl-1:1.1.1k-6.el8_5 |
CVE-2022-24765 | anchore_cve | Medium | git-2.31.1-2.el8 |
CVE-2022-24765 | twistlock_cve | Medium | git-2.31.1-2.el8 |
CVE-2022-24765 | anchore_cve | Medium | git-core-2.31.1-2.el8 |
CVE-2022-24765 | twistlock_cve | Medium | git-core-2.31.1-2.el8 |
CVE-2022-24765 | anchore_cve | Medium | git-core-doc-2.31.1-2.el8 |
CVE-2022-24765 | anchore_cve | Medium | perl-Git-2.31.1-2.el8 |
CVE-2022-24765 | twistlock_cve | Medium | perl-Git-2.31.1-2.el8 |
PRISMA-2022-0039 | twistlock_cve | High | minimatch-3.0.4 |
CCE-85886-0 | oscap_comp | Medium | |
CVE-2022-29244 | twistlock_cve | Medium | nodejs-14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2022-29244 | twistlock_cve | Medium | nodejs-full-i18n-14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2022-29244 | twistlock_cve | Medium | npm-6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2022-33987 | twistlock_cve | Medium | got-6.7.1 |
CVE-2022-33987 | twistlock_cve | Medium | nodejs-14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2022-33987 | twistlock_cve | Medium | nodejs-full-i18n-14.18.2-2.module+el8.5.0+13644+8d46dafd |
CVE-2022-33987 | twistlock_cve | Medium | npm-6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd |
CVE-2022-2068 | twistlock_cve | Medium | openssl-1.1.1k-6.el8_5 |
CVE-2022-2068 | anchore_cve | Medium | openssl-1:1.1.1k-6.el8_5 |
VAT: https://vat.dso.mil/vat/container/10973?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/sonarsource/sonar-scanner-cli/-/jobs/12270253
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Approval" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications -
Send approval request to Authorizing Official -
Close issue after approval from Authorizing Official
Note: If the above approval process is rejected for any reason, the
Approval
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theApproval
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.