UNCLASSIFIED - NO CUI

chore(findings): tetrate/istio/install-cni (arm64)

Summary

tetrate/istio/install-cni (arm64) has 34 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=tetrate/istio/install-cni&tag=1.24.6-tetratefips-crypto-updatestream12-distroless-arm64&branch=master

EPSS (Exploit Prediction Scoring System) provides an estimate of the likelihood that a vulnerability will be exploited in the wild.

KEV (Known Exploited Vulnerabilities) indicates whether a vulnerability is actively being exploited according to CISA.

id source severity package impact workaround epss_score kev
CVE-2018-20796 Anchore CVE Low ld-linux-2.42-r3 0.01701 false
CVE-2018-20796 Anchore CVE Low glibc-locale-posix-2.42-r3 0.01701 false
CVE-2018-20796 Anchore CVE Low glibc-2.42-r3 0.01701 false
CVE-2019-9192 Anchore CVE Low ld-linux-2.42-r3 0.00942 false
CVE-2019-9192 Anchore CVE Low glibc-2.42-r3 0.00942 false
CVE-2019-9192 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00942 false
CVE-2010-4756 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00691 false
CVE-2010-4756 Anchore CVE Low ld-linux-2.42-r3 0.00691 false
CVE-2010-4756 Anchore CVE Low glibc-2.42-r3 0.00691 false
CVE-2012-2663 Anchore CVE Low ip6tables-1.8.11-r28 0.00480 false
CVE-2012-2663 Anchore CVE Low iptables-1.8.11-r28 0.00480 false
CVE-2012-2663 Anchore CVE Low xtables-1.8.11-r28 0.00480 false
CVE-2019-1010024 Anchore CVE Low ld-linux-2.42-r3 0.00364 false
CVE-2019-1010024 Anchore CVE Low glibc-2.42-r3 0.00364 false
CVE-2019-1010024 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00364 false
CVE-2019-1010025 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00356 false
CVE-2019-1010025 Anchore CVE Low glibc-2.42-r3 0.00356 false
CVE-2019-1010025 Anchore CVE Low ld-linux-2.42-r3 0.00356 false
CVE-2019-1010023 Anchore CVE Low glibc-2.42-r3 0.00346 false
CVE-2019-1010023 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00346 false
CVE-2019-1010023 Anchore CVE Low ld-linux-2.42-r3 0.00346 false
CVE-2019-1010022 Anchore CVE Low ld-linux-2.42-r3 0.00145 false
CVE-2019-1010022 Anchore CVE Low glibc-locale-posix-2.42-r3 0.00145 false
CVE-2019-1010022 Anchore CVE Low glibc-2.42-r3 0.00145 false
CVE-2025-61727 Twistlock CVE Low crypto/x509-1.24.9 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.9 0.00021 false
CVE-2025-61727 Anchore CVE Medium stdlib-go1.24.9 0.00021 false
CVE-2025-61729 Twistlock CVE Low crypto/x509-1.24.9 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.9 0.00016 false
CVE-2025-61729 Anchore CVE High stdlib-go1.24.9 0.00016 false
GHSA-j5w8-q4qc-rx2x Anchore CVE Medium golang.org/x/crypto-v0.40.0 N/A N/A
GHSA-j5w8-q4qc-rx2x Anchore CVE Medium golang.org/x/crypto-v0.40.0 N/A N/A
GHSA-f6x5-jh6r-wrfv Anchore CVE Medium golang.org/x/crypto-v0.40.0 N/A N/A
GHSA-f6x5-jh6r-wrfv Anchore CVE Medium golang.org/x/crypto-v0.40.0 N/A N/A

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=tetrate/istio/install-cni&tag=1.24.6-tetratefips-crypto-updatestream12-distroless-arm64&branch=master

Tasks

Contributor:

  • Apply the StatusReview label to this issue for a merge request review and wait for feedback

OR

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue for a VAT justifications review and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Review or Verification label will be removed and the issue will be sent back to To-Do. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Review or Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by CHORE_TOKEN
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information