chore(findings): sonarsource/sonarqube/sonarqube
Summary
sonarsource/sonarqube/sonarqube has 36 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
GHSA-hr8g-6v94-x4m9 | Anchore CVE | Medium | bcprov-jdk15on-1.64 |
GHSA-493p-pfq6-5258 | Anchore CVE | High | json-smart-2.4.8 |
CVE-2023-28708 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2021-33037 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
GHSA-24rp-q3w6-vc56 | Anchore CVE | Critical | postgresql-42.7.1 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bcprov-jdk15on-1.64 |
GHSA-pw39-f3m5-cxfc | Anchore CVE | Medium | elasticsearch-8.11.0 |
CVE-2021-42340 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
CVE-2021-30640 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2022-29885 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
GHSA-4g9r-vxhx-9pgx | Anchore CVE | High | commons-compress-1.25.0 |
CVE-2022-45143 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
GHSA-3f7h-mf4q-vrm4 | Anchore CVE | Medium | woodstox-core-5.2.1 |
CVE-2023-38286 | Anchore CVE | High | thymeleaf-3.0.14.release |
CVE-2023-46589 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
GHSA-w5gg-2q56-6h4f | Anchore CVE | Medium | elasticsearch-8.11.0 |
CVE-2016-5425 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
GHSA-xfrj-6vvc-3xm2 | Anchore CVE | Medium | xmlsec-2.2.3 |
GHSA-4265-ccf5-phj5 | Anchore CVE | High | commons-compress-1.25.0 |
GHSA-r3hx-qfh5-r9m7 | Anchore CVE | Medium | elasticsearch-8.11.0 |
CVE-2022-34305 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2022-23181 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
CVE-2023-45648 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2023-41080 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2021-43980 | Anchore CVE | Low | tomcat-embed-el-9.0.44 |
GHSA-wjxj-5m7g-mg7q | Anchore CVE | Medium | bcprov-jdk15on-1.64 |
CVE-2023-44487 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
GHSA-68m8-v89j-7j2p | Anchore CVE | Medium | bc-fips-1.0.2 |
GHSA-6xx3-rg99-gc3p | Anchore CVE | Medium | bc-fips-1.0.2 |
CVE-2022-42252 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
CVE-2023-42795 | Anchore CVE | Medium | tomcat-embed-el-9.0.44 |
CVE-2021-30639 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
CVE-2016-6325 | Anchore CVE | High | tomcat-embed-el-9.0.44 |
CVE-2024-30171 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.64 |
CVE-2024-30172 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.64 |
CVE-2024-29857 | Twistlock CVE | Medium | org.bouncycastle_bcprov-jdk15on-1.64 |
VAT: https://vat.dso.mil/vat/image?imageName=sonarsource/sonarqube/sonarqube&tag=10.5.1-datacenter-app&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=sonarsource/sonarqube/sonarqube&tag=10.5.0-datacenter-app&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.