chore(findings): tpc/tak/tak-server-db
Summary
tpc/tak/tak-server-db has 49 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2022-48281 | Anchore CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2022-48281 | Anchore CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25435 | Anchore CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-25435 | Anchore CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-26966 | Anchore CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-3576 | Anchore CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25433 | Anchore CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-26966 | Anchore CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-3576 | Anchore CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2020-8908 | Anchore CVE | Low | guava-31.1-android |
CVE-2022-48281 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2022-48281 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-25193 | Twistlock CVE | Medium | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2023-25193 | Twistlock CVE | Medium | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2023-38289 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-38289 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-38288 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-38288 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-3618 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-3618 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-38473 | Twistlock CVE | Medium | avahi-libs-0.7-20.el8 |
CVE-2023-38472 | Twistlock CVE | Medium | avahi-libs-0.7-20.el8 |
CVE-2023-38471 | Twistlock CVE | Medium | avahi-libs-0.7-20.el8 |
CVE-2023-38470 | Twistlock CVE | Medium | avahi-libs-0.7-20.el8 |
CVE-2023-38469 | Twistlock CVE | Medium | avahi-libs-0.7-20.el8 |
CVE-2023-38197 | Twistlock CVE | Medium | qt5-qtbase-common-5.15.3-1.el8 |
CVE-2023-38197 | Twistlock CVE | Medium | qt5-qtbase-gui-5.15.3-1.el8 |
CVE-2023-38197 | Twistlock CVE | Medium | qt5-qtbase-5.15.3-1.el8 |
CVE-2023-3576 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-3576 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-26966 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-26966 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25435 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25435 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-25433 | Twistlock CVE | Medium | libtiff-devel-4.0.9-27.el8 |
CVE-2023-25433 | Twistlock CVE | Medium | libtiff-4.0.9-27.el8 |
CVE-2023-22041 | Twistlock CVE | Medium | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2023-22041 | Twistlock CVE | Medium | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2023-22049 | Twistlock CVE | Medium | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2023-22049 | Twistlock CVE | Medium | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2023-22036 | Twistlock CVE | Medium | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2023-22036 | Twistlock CVE | Medium | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2023-22045 | Twistlock CVE | Low | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2023-22045 | Twistlock CVE | Low | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2020-8908 | Twistlock CVE | Low | com.google.guava_guava-31.1 |
CVE-2023-22006 | Twistlock CVE | Low | java-11-openjdk-headless-11.0.19.0.7-4.el8 |
CVE-2023-22006 | Twistlock CVE | Low | java-11-openjdk-11.0.19.0.7-4.el8 |
CVE-2020-16588 | Twistlock CVE | Low | OpenEXR-libs-2.2.0-12.el8 |
VAT: https://vat.dso.mil/vat/image?imageName=tpc/tak/tak-server-db&tag=4.9&branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/tpc/tak/tak-server-db/-/jobs/23061661
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.