chore(findings): opensource/postgres/postgresql11
Summary
opensource/postgres/postgresql11 has 129 new findings discovered during continuous monitoring.
| id | source | package |
|---|---|---|
| CVE-2019-18276 | anchore_cve | bash-4.4.19-12.el8 |
| CVE-2020-8927 | anchore_cve | brotli-1.0.6-2.el8 |
| CVE-2020-8231 | anchore_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8284 | anchore_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8285 | anchore_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8286 | anchore_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2021-22876 | anchore_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2019-13012 | anchore_cve | glib2-2.56.4-8.el8 |
| CVE-2021-27218 | anchore_cve | glib2-2.56.4-8.el8 |
| CVE-2021-27219 | anchore_cve | glib2-2.56.4-8.el8 |
| CVE-2021-28153 | anchore_cve | glib2-2.56.4-8.el8 |
| CVE-2021-27645 | anchore_cve | glibc-langpack-en-2.28-151.el8 |
| CVE-2020-28196 | anchore_cve | krb5-libs-1.18.2-5.el8 |
| CVE-2020-8231 | anchore_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8284 | anchore_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8285 | anchore_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8286 | anchore_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2021-22876 | anchore_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2019-2708 | anchore_cve | libdb-5.3.28-39.el8 |
| CVE-2019-2708 | anchore_cve | libdb-utils-5.3.28-39.el8 |
| CVE-2021-3445 | anchore_cve | libdnf-0.48.0-5.el8 |
| CVE-2020-24977 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3516 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3517 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3518 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3537 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3541 | anchore_cve | libxml2-2.9.7-8.el8 |
| CVE-2020-29361 | anchore_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29362 | anchore_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29363 | anchore_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29361 | anchore_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-29362 | anchore_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-29363 | anchore_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-26116 | anchore_cve | platform-python-3.6.8-31.el8 |
| CVE-2020-27619 | anchore_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-23336 | anchore_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-3177 | anchore_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-3426 | anchore_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-3445 | anchore_cve | python3-hawkey-0.48.0-5.el8 |
| CVE-2021-3445 | anchore_cve | python3-libdnf-0.48.0-5.el8 |
| CVE-2020-26116 | anchore_cve | python3-libs-3.6.8-31.el8 |
| CVE-2020-27619 | anchore_cve | python3-libs-3.6.8-31.el8 |
| CVE-2021-23336 | anchore_cve | python3-libs-3.6.8-31.el8 |
| CVE-2021-3177 | anchore_cve | python3-libs-3.6.8-31.el8 |
| CVE-2021-3426 | anchore_cve | python3-libs-3.6.8-31.el8 |
| CVE-2020-24977 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-3516 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-3517 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-3518 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-3537 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-3541 | anchore_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2021-20266 | anchore_cve | python3-rpm-4.14.3-4.el8 |
| CVE-2021-20271 | anchore_cve | python3-rpm-4.14.3-4.el8 |
| CVE-2021-3421 | anchore_cve | python3-rpm-4.14.3-4.el8 |
| CVE-2020-26137 | anchore_cve | python3-urllib3-1.24.2-4.el8 |
| CVE-2021-20266 | anchore_cve | rpm-4.14.3-4.el8 |
| CVE-2021-20271 | anchore_cve | rpm-4.14.3-4.el8 |
| CVE-2021-3421 | anchore_cve | rpm-4.14.3-4.el8 |
| CVE-2021-20266 | anchore_cve | rpm-build-libs-4.14.3-4.el8 |
| CVE-2021-20271 | anchore_cve | rpm-build-libs-4.14.3-4.el8 |
| CVE-2021-3421 | anchore_cve | rpm-build-libs-4.14.3-4.el8 |
| CVE-2021-20266 | anchore_cve | rpm-libs-4.14.3-4.el8 |
| CVE-2021-20271 | anchore_cve | rpm-libs-4.14.3-4.el8 |
| CVE-2021-3421 | anchore_cve | rpm-libs-4.14.3-4.el8 |
| CVE-2020-13434 | anchore_cve | sqlite-libs-3.26.0-11.el8 |
| CVE-2020-13435 | anchore_cve | sqlite-libs-3.26.0-11.el8 |
| CVE-2020-15358 | anchore_cve | sqlite-libs-3.26.0-11.el8 |
| CVE-2019-3842 | anchore_cve | systemd-239-41.el8_3.2 |
| CVE-2020-13776 | anchore_cve | systemd-239-41.el8_3.2 |
| CVE-2019-3842 | anchore_cve | systemd-libs-239-41.el8_3.2 |
| CVE-2020-13776 | anchore_cve | systemd-libs-239-41.el8_3.2 |
| CVE-2019-3842 | anchore_cve | systemd-pam-239-41.el8_3.2 |
| CVE-2020-13776 | anchore_cve | systemd-pam-239-41.el8_3.2 |
| CCE-83364-0 | oscap_comp | None |
| CCE-83377-2 | oscap_comp | None |
| CVE-2019-18276 | twistlock_cve | bash-4.4.19-12.el8 |
| CVE-2020-8927 | twistlock_cve | brotli-1.0.6-2.el8 |
| CVE-2020-8231 | twistlock_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8284 | twistlock_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8285 | twistlock_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2020-8286 | twistlock_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2021-22876 | twistlock_cve | curl-7.61.1-14.el8_3.1 |
| CVE-2019-13012 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-13543 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-13584 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-9948 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-9951 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-9983 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2021-27218 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2021-27219 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2021-28153 | twistlock_cve | glib2-2.56.4-8.el8 |
| CVE-2020-28196 | twistlock_cve | krb5-libs-1.18.2-5.el8 |
| CVE-2020-8231 | twistlock_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8284 | twistlock_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8285 | twistlock_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2020-8286 | twistlock_cve | libcurl-7.61.1-14.el8_3.1 |
| CVE-2019-2708 | twistlock_cve | libdb-5.3.28-39.el8 |
| CVE-2019-2708 | twistlock_cve | libdb-utils-5.3.28-39.el8 |
| CVE-2021-3445 | twistlock_cve | libdnf-0.48.0-5.el8 |
| CVE-2020-24977 | twistlock_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3517 | twistlock_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3518 | twistlock_cve | libxml2-2.9.7-8.el8 |
| CVE-2021-3537 | twistlock_cve | libxml2-2.9.7-8.el8 |
| CVE-2020-29361 | twistlock_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29362 | twistlock_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29363 | twistlock_cve | p11-kit-0.23.14-5.el8_0 |
| CVE-2020-29361 | twistlock_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-29362 | twistlock_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-29363 | twistlock_cve | p11-kit-trust-0.23.14-5.el8_0 |
| CVE-2020-26116 | twistlock_cve | platform-python-3.6.8-31.el8 |
| CVE-2020-27619 | twistlock_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-23336 | twistlock_cve | platform-python-3.6.8-31.el8 |
| CVE-2021-3177 | twistlock_cve | platform-python-3.6.8-31.el8 |
| CVE-2020-26116 | twistlock_cve | python3-libs-3.6.8-31.el8 |
| CVE-2020-27619 | twistlock_cve | python3-libs-3.6.8-31.el8 |
| CVE-2021-23336 | twistlock_cve | python3-libs-3.6.8-31.el8 |
| CVE-2021-3177 | twistlock_cve | python3-libs-3.6.8-31.el8 |
| CVE-2020-24977 | twistlock_cve | python3-libxml2-2.9.7-8.el8 |
| CVE-2020-26137 | twistlock_cve | python3-urllib3-1.24.2-4.el8 |
| CVE-2021-20266 | twistlock_cve | rpm-4.14.3-4.el8 |
| CVE-2021-3421 | twistlock_cve | rpm-4.14.3-4.el8 |
| CVE-2020-13434 | twistlock_cve | sqlite-libs-3.26.0-11.el8 |
| CVE-2020-15358 | twistlock_cve | sqlite-libs-3.26.0-11.el8 |
| CVE-2019-3842 | twistlock_cve | systemd-239-41.el8_3.2 |
| CVE-2020-13776 | twistlock_cve | systemd-239-41.el8_3.2 |
| CVE-2019-3842 | twistlock_cve | systemd-libs-239-41.el8_3.2 |
| CVE-2020-13776 | twistlock_cve | systemd-libs-239-41.el8_3.2 |
| CVE-2019-3842 | twistlock_cve | systemd-pam-239-41.el8_3.2 |
| CVE-2020-13776 | twistlock_cve | systemd-pam-239-41.el8_3.2 |
More information can be found in the failed pipeline located here: https://repo1.dso.mil/dsop/opensource/postgres/postgresql11/-/jobs/3457700
Definition of Done
Justifications:
-
All findings have been justified -
Justifications have been provided to the container hardening team
Approval Process:
-
Findings Approver has reviewed and approved all justifications -
Approval request has been sent to Authorizing Official -
Approval request has been processed by Authorizing Official