chore(findings): valley-tech-systems/selenium-python
Summary
valley-tech-systems/selenium-python has 25 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
CVE-2022-0561 | anchore_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0562 | anchore_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0562 | twistlock_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0865 | anchore_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0865 | twistlock_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0891 | anchore_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0891 | twistlock_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0908 | anchore_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0908 | twistlock_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0909 | anchore_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0909 | twistlock_cve | Low | libtiff-4.0.9-21.el8 |
CVE-2022-0924 | anchore_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-0924 | twistlock_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-1355 | anchore_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-1355 | twistlock_cve | Medium | libtiff-4.0.9-21.el8 |
CVE-2022-25308 | anchore_cve | Medium | fribidi-1.0.4-8.el8 |
CVE-2022-25309 | anchore_cve | Medium | fribidi-1.0.4-8.el8 |
CVE-2022-25310 | anchore_cve | Low | fribidi-1.0.4-8.el8 |
CVE-2022-27404 | anchore_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2022-27404 | twistlock_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2022-27405 | anchore_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2022-27405 | twistlock_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2022-27406 | anchore_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2022-27406 | twistlock_cve | Medium | freetype-2.9.1-4.el8_3.1 |
CVE-2021-46822 | twistlock_cve | Medium | libjpeg-turbo-1.5.3-12.el8 |
VAT: https://vat.dso.mil/vat/container/19937?branch=master
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/valley-tech-systems/selenium-python/-/jobs/10787034
Definition of Done
Justifications:
-
All findings have been justified -
Justifications have been provided to the container hardening team
Approval Process:
-
Findings Approver has reviewed and approved all justifications -
Approval request has been sent to Authorizing Official -
Approval request has been processed by Authorizing Official
Edited by Ghost User