UNCLASSIFIED - NO CUI

chore(findings): opensource/istio/istioctl

Summary

opensource/istio/istioctl has 82 new findings discovered during continuous monitoring.

id source severity package
GHSA-2wrh-6pvc-2jm9 Anchore CVE Medium golang.org/x/net-v0.7.0
GHSA-4374-p667-p6c8 Anchore CVE High golang.org/x/net-v0.7.0
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium golang.org/x/net-v0.7.0
GHSA-m425-mq94-257g Anchore CVE High google.golang.org/grpc-v1.49.0
GHSA-qppj-fm5r-hxr3 Anchore CVE Medium google.golang.org/grpc-v1.49.0
CVE-2023-29383 Anchore CVE Medium libblkid-2.37.4-15.el9
CVE-2023-27043 Anchore CVE Medium python3-3.9.18-1.el9_3
CVE-2020-19190 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2021-23336 Anchore CVE Medium python3-3.9.18-1.el9_3
CVE-2022-48554 Anchore CVE Low file-libs-5.39-14.el9
CVE-2020-19186 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-29383 Anchore CVE Medium libuuid-2.37.4-15.el9
CVE-2021-35938 Anchore CVE Medium rpm-libs-4.16.1.3-25.el9
CVE-2023-2975 Anchore CVE Low openssl-libs-1:3.0.7-24.el9
CVE-2023-5156 Anchore CVE Medium glibc-langpack-en-2.34-83.el9_3.7
CVE-2023-5156 Anchore CVE Medium glibc-minimal-langpack-2.34-83.el9_3.7
CVE-2020-19186 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2021-35937 Anchore CVE Medium rpm-4.16.1.3-25.el9
CVE-2021-35939 Anchore CVE Medium rpm-libs-4.16.1.3-25.el9
CVE-2020-19187 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2020-19189 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2022-48566 Anchore CVE Medium python-unversioned-command-3.9.18-1.el9_3
CVE-2021-22925 Anchore CVE Low libcurl-minimal-7.76.1-26.el9_3.2
CVE-2023-45853 Anchore CVE Medium zlib-1.2.11-40.el9
CVE-2021-27212 Anchore CVE Medium openldap-2.6.3-1.el9
CVE-2023-27043 Anchore CVE Medium python3-libs-3.9.18-1.el9_3
CVE-2023-5156 Anchore CVE Medium glibc-common-2.34-83.el9_3.7
CVE-2020-19185 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2023-4039 Anchore CVE Medium libstdc++-11.4.1-2.1.el9
CVE-2023-28320 Anchore CVE Low libcurl-minimal-7.76.1-26.el9_3.2
CVE-2023-2953 Anchore CVE Low openldap-compat-2.6.3-1.el9
CVE-2021-3997 Anchore CVE Medium systemd-libs-252-18.el9
CVE-2023-29383 Anchore CVE Medium libmount-2.37.4-15.el9
CVE-2022-0391 Anchore CVE Medium python3-3.9.18-1.el9_3
CVE-2021-35938 Anchore CVE Medium rpm-4.16.1.3-25.el9
CVE-2021-35937 Anchore CVE Medium rpm-libs-4.16.1.3-25.el9
CVE-2023-24593 Anchore CVE Low glib2-2.68.4-11.el9
CVE-2023-32636 Anchore CVE Low glib2-2.68.4-11.el9
CVE-2023-3446 Anchore CVE Low openssl-libs-1:3.0.7-24.el9
CVE-2020-19185 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-0687 Anchore CVE Medium glibc-langpack-en-2.34-83.el9_3.7
CVE-2023-0687 Anchore CVE Medium glibc-minimal-langpack-2.34-83.el9_3.7
CVE-2020-19188 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-0687 Anchore CVE Medium glibc-common-2.34-83.el9_3.7
CVE-2022-48566 Anchore CVE Medium python3-3.9.18-1.el9_3
CVE-2021-23336 Anchore CVE Medium python3-libs-3.9.18-1.el9_3
CVE-2023-2953 Anchore CVE Low openldap-2.6.3-1.el9
CVE-2023-3817 Anchore CVE Low openssl-libs-1:3.0.7-24.el9
CVE-2023-28320 Anchore CVE Low curl-minimal-7.76.1-26.el9_3.2
CVE-2023-4039 Anchore CVE Medium libgcc-11.4.1-2.1.el9
CVE-2022-48565 Anchore CVE Medium python3-3.9.18-1.el9_3
CVE-2023-25180 Anchore CVE Low glib2-2.68.4-11.el9
CVE-2023-5156 Anchore CVE Medium glibc-2.34-83.el9_3.7
CVE-2020-19188 Anchore CVE Medium ncurses-base-6.2-10.20210508.el9
CVE-2022-0391 Anchore CVE Medium python3-libs-3.9.18-1.el9_3
CVE-2022-48565 Anchore CVE Medium python-unversioned-command-3.9.18-1.el9_3
CVE-2021-44568 Anchore CVE Low libsolv-0.7.24-2.el9
CVE-2021-22925 Anchore CVE Low curl-minimal-7.76.1-26.el9_3.2
CVE-2020-19190 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-39615 Anchore CVE Medium libxml2-2.9.13-4.el9
CVE-2021-23336 Anchore CVE Medium python-unversioned-command-3.9.18-1.el9_3
CVE-2022-0391 Anchore CVE Medium python-unversioned-command-3.9.18-1.el9_3
CVE-2020-19189 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-0687 Anchore CVE Medium glibc-2.34-83.el9_3.7
CVE-2022-48566 Anchore CVE Medium python3-libs-3.9.18-1.el9_3
CVE-2021-27212 Anchore CVE Medium openldap-compat-2.6.3-1.el9
CVE-2022-48565 Anchore CVE Medium python3-libs-3.9.18-1.el9_3
CVE-2021-3572 Anchore CVE Low python3-pip-wheel-21.2.3-7.el9
CVE-2023-29383 Anchore CVE Medium libsmartcols-2.37.4-15.el9
CVE-2021-23840 Anchore CVE Medium openssl-libs-1:3.0.7-24.el9
CVE-2021-35939 Anchore CVE Medium rpm-4.16.1.3-25.el9
CVE-2020-19187 Anchore CVE Medium ncurses-libs-6.2-10.20210508.el9
CVE-2023-27043 Anchore CVE Medium python-unversioned-command-3.9.18-1.el9_3
CVE-2023-5363 Anchore CVE Medium openssl-libs-1:3.0.7-24.el9
CVE-2023-5678 Anchore CVE Low openssl-libs-1:3.0.7-24.el9
CVE-2022-48468 OSCAP Compliance Medium
CVE-2023-39323 Twistlock CVE Critical go-1.19.11
CVE-2023-3978 Twistlock CVE Medium golang.org/x/net-v0.7.0
CVE-2023-44487 Twistlock CVE Medium golang.org/x/net-v0.7.0
CVE-2023-39325 Twistlock CVE High golang.org/x/net-v0.7.0
GHSA-m425-mq94-257g Twistlock CVE High google.golang.org/grpc-v1.49.0
CVE-2023-44487 Twistlock CVE Medium google.golang.org/grpc-v1.49.0

VAT: https://vat.dso.mil/vat/image?imageName=opensource/istio/istioctl&tag=1.16.7-ubi9&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/istio/istioctl&tag=1.16.7-ubi9&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information