UNCLASSIFIED - NO CUI

chore(findings): sonarsource/sonar-scanner-cli

Summary

sonarsource/sonar-scanner-cli has 55 new findings discovered during continuous monitoring.

id source severity package
CCE-85987-6 oscap_comp Medium
CVE-2015-20107 twistlock_cve Medium python36-3.6.8-38.module+el8.5.0+12207+5c5719bc
CVE-2020-28469 anchore_cve Medium nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-28469 anchore_cve Medium nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-28469 anchore_cve Medium nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-28469 anchore_cve Medium npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2020-7788 anchore_cve Medium nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-7788 anchore_cve Medium nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-7788 anchore_cve Medium nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2020-7788 anchore_cve Medium npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-22959 anchore_cve Low nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22959 anchore_cve Low nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22959 anchore_cve Low nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22959 anchore_cve Low npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-22960 anchore_cve Low nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22960 anchore_cve Low nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22960 anchore_cve Low nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-22960 anchore_cve Low npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-33502 anchore_cve Medium nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-33502 anchore_cve Medium nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-33502 anchore_cve Medium nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-33502 anchore_cve Medium npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-3807 anchore_cve Medium nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3807 anchore_cve Medium nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3807 anchore_cve Medium nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3807 anchore_cve Medium npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-3918 anchore_cve High nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3918 anchore_cve High nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3918 anchore_cve High nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-3918 anchore_cve High npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-43616 anchore_cve High nodejs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-43616 anchore_cve High nodejs-docs-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-43616 anchore_cve High nodejs-full-i18n-1:14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2021-43616 anchore_cve High npm-1:6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2021-44906 twistlock_cve Critical minimist-1.2.5
CVE-2022-0391 twistlock_cve Medium python36-3.6.8-38.module+el8.5.0+12207+5c5719bc
CVE-2022-1292 anchore_cve Medium openssl-1:1.1.1k-6.el8_5
CVE-2022-24765 anchore_cve Medium git-2.31.1-2.el8
CVE-2022-24765 twistlock_cve Medium git-2.31.1-2.el8
CVE-2022-24765 anchore_cve Medium git-core-2.31.1-2.el8
CVE-2022-24765 twistlock_cve Medium git-core-2.31.1-2.el8
CVE-2022-24765 anchore_cve Medium git-core-doc-2.31.1-2.el8
CVE-2022-24765 anchore_cve Medium perl-Git-2.31.1-2.el8
CVE-2022-24765 twistlock_cve Medium perl-Git-2.31.1-2.el8
PRISMA-2022-0039 twistlock_cve High minimatch-3.0.4
CCE-85886-0 oscap_comp Medium
CVE-2022-29244 twistlock_cve Medium nodejs-14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2022-29244 twistlock_cve Medium nodejs-full-i18n-14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2022-29244 twistlock_cve Medium npm-6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2022-33987 twistlock_cve Medium got-6.7.1
CVE-2022-33987 twistlock_cve Medium nodejs-14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2022-33987 twistlock_cve Medium nodejs-full-i18n-14.18.2-2.module+el8.5.0+13644+8d46dafd
CVE-2022-33987 twistlock_cve Medium npm-6.14.15-1.14.18.2.2.module+el8.5.0+13644+8d46dafd
CVE-2022-2068 twistlock_cve Medium openssl-1.1.1k-6.el8_5
CVE-2022-2068 anchore_cve Medium openssl-1:1.1.1k-6.el8_5

VAT: https://vat.dso.mil/vat/container/10973?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/sonarsource/sonar-scanner-cli/-/jobs/12270253

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the ~"Approval" label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications
  • Send approval request to Authorizing Official
  • Close issue after approval from Authorizing Official

Note: If the above approval process is rejected for any reason, the Approval label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Approval label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information