From 1350fcaf2a9e1f8868c613dd1954ddf2cc82a5ec Mon Sep 17 00:00:00 2001 From: rancher-security-bot <119513217+rancher-security-bot@users.noreply.github.com> Date: Thu, 27 Feb 2025 06:11:37 +0000 Subject: [PATCH] Update 2025-02-27 --- docs/csv/report-harvester-master-cves.csv | 12 +- docs/csv/report-harvester-master-stats.csv | 2 +- docs/csv/report-longhorn-v1.7.2-cves.csv | 89 -- docs/csv/report-longhorn-v1.7.2-stats.csv | 15 - docs/csv/report-longhorn-v1.7.3-cves.csv | 6 + docs/csv/report-longhorn-v1.7.3-stats.csv | 15 + docs/csv/report-rancher-v2.10-head-cves.csv | 6 +- docs/csv/report-rancher-v2.10-head-stats.csv | 2 +- docs/csv/report-rancher-v2.10.2-cves.csv | 6 +- docs/csv/report-rancher-v2.10.2-stats.csv | 2 +- docs/csv/report-rancher-v2.8-head-cves.csv | 30 +- docs/csv/report-rancher-v2.8-head-stats.csv | 6 +- docs/csv/report-rancher-v2.8.12-cves.csv | 30 +- docs/csv/report-rancher-v2.8.12-stats.csv | 6 +- docs/csv/report-rancher-v2.9-head-cves.csv | 95 +- docs/csv/report-rancher-v2.9-head-stats.csv | 6 +- docs/csv/report-rancher-v2.9.6-cves.csv | 7 +- docs/csv/report-rancher-v2.9.6-stats.csv | 4 +- docs/harvester-master.html | 48 +- docs/index.html | 6 +- docs/longhorn-v1.7.2.html | 1227 ------------------ docs/longhorn-v1.7.3.html | 231 ++++ docs/rancher-v2.10-head.html | 6 +- docs/rancher-v2.10.2.html | 6 +- docs/rancher-v2.8-head.html | 180 ++- docs/rancher-v2.8.12.html | 180 ++- docs/rancher-v2.9-head.html | 1074 +-------------- docs/rancher-v2.9.6.html | 18 +- 28 files changed, 636 insertions(+), 2679 deletions(-) delete mode 100644 docs/csv/report-longhorn-v1.7.2-cves.csv delete mode 100644 docs/csv/report-longhorn-v1.7.2-stats.csv create mode 100644 docs/csv/report-longhorn-v1.7.3-cves.csv create mode 100644 docs/csv/report-longhorn-v1.7.3-stats.csv delete mode 100644 docs/longhorn-v1.7.2.html create mode 100644 docs/longhorn-v1.7.3.html diff --git a/docs/csv/report-harvester-master-cves.csv b/docs/csv/report-harvester-master-cves.csv index ad0216d..f4e1839 100644 --- a/docs/csv/report-harvester-master-cves.csv +++ b/docs/csv/report-harvester-master-cves.csv @@ -1,10 +1,10 @@ image,release,package_name,package_version,type,vulnerability_id,severity,url,target,patched_version,mirrored,status,justification -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,golang.org/x/net,v0.20.0,gobinary,CVE-2024-45338,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-45338,ip-control-loop,0.33.0,false,affected,severity_changed_due_to_suse_cvss_score -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,stdlib,v1.21.9,gobinary,CVE-2024-24790,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-24790,ip-control-loop,"1.21.11, 1.22.4",false,affected,severity_changed_due_to_suse_cvss_score -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,stdlib,v1.21.9,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,ip-control-loop,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,golang.org/x/net,v0.20.0,gobinary,CVE-2024-45338,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-45338,whereabouts,0.33.0,false,affected,severity_changed_due_to_suse_cvss_score -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,stdlib,v1.21.9,gobinary,CVE-2024-24790,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-24790,whereabouts,"1.21.11, 1.22.4",false,affected,severity_changed_due_to_suse_cvss_score -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,harvester/master,stdlib,v1.21.9,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,whereabouts,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,libcrypto3,3.3.1-r3,alpine,CVE-2024-12797,HIGH,https://avd.aquasec.com/nvd/cve-2024-12797,ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 (alpine 3.20.2),3.3.3-r0,false,affected, +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,libssl3,3.3.1-r3,alpine,CVE-2024-12797,HIGH,https://avd.aquasec.com/nvd/cve-2024-12797,ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 (alpine 3.20.2),3.3.3-r0,false,affected, +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,golang.org/x/net,v0.24.0,gobinary,CVE-2024-45338,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-45338,ip-control-loop,0.33.0,false,affected,severity_changed_due_to_suse_cvss_score +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,stdlib,v1.21.12,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,ip-control-loop,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,golang.org/x/net,v0.24.0,gobinary,CVE-2024-45338,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-45338,whereabouts,0.33.0,false,affected,severity_changed_due_to_suse_cvss_score +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,harvester/master,stdlib,v1.21.12,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,whereabouts,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score ghcr.io/kube-vip/kube-vip-iptables:v0.8.1,harvester/master,libcrypto3,3.3.1-r0,alpine,CVE-2024-12797,HIGH,https://avd.aquasec.com/nvd/cve-2024-12797,ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 (alpine 3.20.0),3.3.3-r0,false,affected, ghcr.io/kube-vip/kube-vip-iptables:v0.8.1,harvester/master,libssl3,3.3.1-r0,alpine,CVE-2024-12797,HIGH,https://avd.aquasec.com/nvd/cve-2024-12797,ghcr.io/kube-vip/kube-vip-iptables:v0.8.1 (alpine 3.20.0),3.3.3-r0,false,affected, ghcr.io/kube-vip/kube-vip-iptables:v0.8.1,harvester/master,stdlib,v1.22.4,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,kube-vip,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score diff --git a/docs/csv/report-harvester-master-stats.csv b/docs/csv/report-harvester-master-stats.csv index b50e569..e6beb9a 100644 --- a/docs/csv/report-harvester-master-stats.csv +++ b/docs/csv/report-harvester-master-stats.csv @@ -1,5 +1,5 @@ image,critical,high,total -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0,0,0,0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0,0,2,2 ghcr.io/kube-vip/kube-vip-iptables:v0.8.1,0,2,2 longhornio/backing-image-manager:v1.8.1-rc1,0,0,0 longhornio/csi-attacher:v4.8.0,0,0,0 diff --git a/docs/csv/report-longhorn-v1.7.2-cves.csv b/docs/csv/report-longhorn-v1.7.2-cves.csv deleted file mode 100644 index 942a1c4..0000000 --- a/docs/csv/report-longhorn-v1.7.2-cves.csv +++ /dev/null @@ -1,89 +0,0 @@ -image,release,package_name,package_version,type,vulnerability_id,severity,url,target,patched_version,mirrored,status,justification -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,glib2-tools,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libgio-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libgmodule-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libgobject-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/backing-image-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/backing-image-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.30.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/backing-image-manager,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/csi-attacher:v4.7.0,longhorn/v1.7.2,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,csi-attacher,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/csi-attacher:v4.7.0,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-attacher,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/csi-node-driver-registrar:v2.12.0,longhorn/v1.7.2,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,csi-node-driver-registrar,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/csi-node-driver-registrar:v2.12.0,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-node-driver-registrar,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/csi-provisioner:v4.0.1-20241007,longhorn/v1.7.2,stdlib,v1.21.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,csi-provisioner,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/csi-provisioner:v4.0.1-20241007,longhorn/v1.7.2,golang.org/x/net,v0.19.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-provisioner,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/csi-resizer:v1.12.0,longhorn/v1.7.2,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,csi-resizer,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/csi-resizer:v1.12.0,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-resizer,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/csi-snapshotter:v7.0.2-20241007,longhorn/v1.7.2,stdlib,v1.21.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,csi-snapshotter,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/csi-snapshotter:v7.0.2-20241007,longhorn/v1.7.2,golang.org/x/net,v0.20.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-snapshotter,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/livenessprobe:v2.14.0,longhorn/v1.7.2,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,livenessprobe,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/livenessprobe:v2.14.0,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,livenessprobe,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-cli:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-cli:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-cli:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-cli:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/longhornctl,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -longhornio/longhorn-cli:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/longhornctl-local,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,libgmodule-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-engine:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,stdlib,v1.22.4,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,usr/local/bin/grpc_health_probe,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,golang.org/x/crypto,v0.24.0,gobinary,CVE-2024-45337,CRITICAL,https://avd.aquasec.com/nvd/cve-2024-45337,usr/local/bin/grpc_health_probe,0.31.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.26.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/grpc_health_probe,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.30.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/longhorn,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-engine:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.30.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/longhorn-instance-manager,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,libgmodule-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-img,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-pr-helper,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:3744-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-15061.6.coco15sp6.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,qemu-tools,8.2.6-150600.3.15.1,sles,SUSE-SU-2024:4094-1,HIGH,,longhornio/longhorn-instance-manager:v1.7.2 (sles 15.6),8.2.7-150600.3.20.1,false,affected, -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,stdlib,v1.22.4,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,usr/local/bin/grpc_health_probe,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/crypto,v0.24.0,gobinary,CVE-2024-45337,CRITICAL,https://avd.aquasec.com/nvd/cve-2024-45337,usr/local/bin/grpc_health_probe,0.31.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.26.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/grpc_health_probe,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-instance-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/bin/longhorn-instance-manager,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,bind-utils,9.18.28-150600.3.3.1,sles,SUSE-SU-2025:0355-1,HIGH,,longhornio/longhorn-manager:v1.7.2 (sles 15.6),9.18.33-150600.3.6.1,false,affected, -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-manager:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/crypto,v0.28.0,gobinary,CVE-2024-45337,CRITICAL,https://avd.aquasec.com/nvd/cve-2024-45337,usr/local/sbin/longhorn-manager,0.31.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.30.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/local/sbin/longhorn-manager,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-share-manager:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-share-manager:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-share-manager:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-share-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-share-manager:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-share-manager:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-share-manager:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-share-manager:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-share-manager:v1.7.2,longhorn/v1.7.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,longhorn-share-manager,0.33.0,false,not_affected,vulnerable_code_not_present -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,libxml2-tools,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/longhorn-ui:v1.7.2,longhorn/v1.7.2,nginx,1.21.5-150600.8.4,sles,SUSE-SU-2025:0283-1,HIGH,,longhornio/longhorn-ui:v1.7.2 (sles 15.6),1.21.5-150600.10.3.1,false,affected, -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,libglib-2_0-0,2.78.6-150600.4.3.1,sles,SUSE-SU-2024:4254-1,HIGH,,longhornio/support-bundle-kit:v0.0.45 (sles 15.6),2.78.6-150600.4.8.1,false,affected, -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/support-bundle-kit:v0.0.45 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,longhornio/support-bundle-kit:v0.0.45 (sles 15.6),4.13-150000.4.11.1,false,affected, -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,longhornio/support-bundle-kit:v0.0.45 (sles 15.6),2.10.3-150500.5.20.1,false,affected, -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,usr/bin/yq,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -longhornio/support-bundle-kit:v0.0.45,longhorn/v1.7.2,golang.org/x/net,v0.27.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/bin/yq,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path diff --git a/docs/csv/report-longhorn-v1.7.2-stats.csv b/docs/csv/report-longhorn-v1.7.2-stats.csv deleted file mode 100644 index 5aa4a56..0000000 --- a/docs/csv/report-longhorn-v1.7.2-stats.csv +++ /dev/null @@ -1,15 +0,0 @@ -image,critical,high,total -longhornio/backing-image-manager:v1.7.2,0,14,14 -longhornio/csi-attacher:v4.7.0,0,0,0 -longhornio/csi-node-driver-registrar:v2.12.0,0,0,0 -longhornio/csi-provisioner:v4.0.1-20241007,0,0,0 -longhornio/csi-resizer:v1.12.0,0,0,0 -longhornio/csi-snapshotter:v7.0.2-20241007,0,0,0 -longhornio/livenessprobe:v2.14.0,0,0,0 -longhornio/longhorn-cli:v1.7.2,0,4,4 -longhornio/longhorn-engine:v1.7.2,0,11,11 -longhornio/longhorn-instance-manager:v1.7.2,0,11,11 -longhornio/longhorn-manager:v1.7.2,0,5,5 -longhornio/longhorn-share-manager:v1.7.2,0,4,4 -longhornio/longhorn-ui:v1.7.2,0,6,6 -longhornio/support-bundle-kit:v0.0.45,0,4,4 diff --git a/docs/csv/report-longhorn-v1.7.3-cves.csv b/docs/csv/report-longhorn-v1.7.3-cves.csv new file mode 100644 index 0000000..f66cf91 --- /dev/null +++ b/docs/csv/report-longhorn-v1.7.3-cves.csv @@ -0,0 +1,6 @@ +image,release,package_name,package_version,type,vulnerability_id,severity,url,target,patched_version,mirrored,status,justification +longhornio/csi-attacher:v4.8.0,longhorn/v1.7.3,golang.org/x/net,v0.32.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-attacher,0.33.0,false,not_affected,vulnerable_code_not_present +longhornio/csi-node-driver-registrar:v2.13.0,longhorn/v1.7.3,golang.org/x/net,v0.32.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-node-driver-registrar,0.33.0,false,not_affected,vulnerable_code_not_present +longhornio/csi-provisioner:v4.0.1-20250204,longhorn/v1.7.3,golang.org/x/net,v0.19.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-provisioner,0.33.0,false,not_affected,vulnerable_code_not_present +longhornio/csi-snapshotter:v7.0.2-20250204,longhorn/v1.7.3,golang.org/x/net,v0.20.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,csi-snapshotter,0.33.0,false,not_affected,vulnerable_code_not_present +longhornio/livenessprobe:v2.15.0,longhorn/v1.7.3,golang.org/x/net,v0.32.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,livenessprobe,0.33.0,false,not_affected,vulnerable_code_not_present diff --git a/docs/csv/report-longhorn-v1.7.3-stats.csv b/docs/csv/report-longhorn-v1.7.3-stats.csv new file mode 100644 index 0000000..d7d7730 --- /dev/null +++ b/docs/csv/report-longhorn-v1.7.3-stats.csv @@ -0,0 +1,15 @@ +image,critical,high,total +longhornio/backing-image-manager:v1.7.3,0,0,0 +longhornio/csi-attacher:v4.8.0,0,0,0 +longhornio/csi-node-driver-registrar:v2.13.0,0,0,0 +longhornio/csi-provisioner:v4.0.1-20250204,0,0,0 +longhornio/csi-resizer:v1.13.1,0,0,0 +longhornio/csi-snapshotter:v7.0.2-20250204,0,0,0 +longhornio/livenessprobe:v2.15.0,0,0,0 +longhornio/longhorn-cli:v1.7.3,0,0,0 +longhornio/longhorn-engine:v1.7.3,0,0,0 +longhornio/longhorn-instance-manager:v1.7.3,0,0,0 +longhornio/longhorn-manager:v1.7.3,0,0,0 +longhornio/longhorn-share-manager:v1.7.3,0,0,0 +longhornio/longhorn-ui:v1.7.3,0,0,0 +longhornio/support-bundle-kit:v0.0.51,0,0,0 diff --git a/docs/csv/report-rancher-v2.10-head-cves.csv b/docs/csv/report-rancher-v2.10-head-cves.csv index 5d5eae4..144e502 100644 --- a/docs/csv/report-rancher-v2.10-head-cves.csv +++ b/docs/csv/report-rancher-v2.10-head-cves.csv @@ -3112,6 +3112,6 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.10-head,stdlib,v1.20.13,gob rancher/system-upgrade-controller:v0.13.4,rancher/v2.10-head,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.10-head,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path rancher/system-upgrade-controller:v0.14.2,rancher/v2.10-head,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, diff --git a/docs/csv/report-rancher-v2.10-head-stats.csv b/docs/csv/report-rancher-v2.10-head-stats.csv index 1185e38..e60cb82 100644 --- a/docs/csv/report-rancher-v2.10-head-stats.csv +++ b/docs/csv/report-rancher-v2.10-head-stats.csv @@ -375,4 +375,4 @@ rancher/system-agent-installer-rke2:v1.31.5-rke2r1,0,0,0 rancher/system-agent:v0.3.11-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 rancher/system-upgrade-controller:v0.14.2,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 diff --git a/docs/csv/report-rancher-v2.10.2-cves.csv b/docs/csv/report-rancher-v2.10.2-cves.csv index ace47e3..8c13fda 100644 --- a/docs/csv/report-rancher-v2.10.2-cves.csv +++ b/docs/csv/report-rancher-v2.10.2-cves.csv @@ -3115,6 +3115,6 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.10.2,stdlib,v1.20.13,gobina rancher/system-upgrade-controller:v0.13.4,rancher/v2.10.2,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.10.2,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path rancher/system-upgrade-controller:v0.14.2,rancher/v2.10.2,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.10.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10.2,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10.2,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.10.2,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, diff --git a/docs/csv/report-rancher-v2.10.2-stats.csv b/docs/csv/report-rancher-v2.10.2-stats.csv index 2d4aaee..c60cd7e 100644 --- a/docs/csv/report-rancher-v2.10.2-stats.csv +++ b/docs/csv/report-rancher-v2.10.2-stats.csv @@ -374,4 +374,4 @@ rancher/system-agent-installer-rke2:v1.31.5-rke2r1,0,0,0 rancher/system-agent:v0.3.11-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 rancher/system-upgrade-controller:v0.14.2,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 diff --git a/docs/csv/report-rancher-v2.8-head-cves.csv b/docs/csv/report-rancher-v2.8-head-cves.csv index bbfe6ac..5b68a69 100644 --- a/docs/csv/report-rancher-v2.8-head-cves.csv +++ b/docs/csv/report-rancher-v2.8-head-cves.csv @@ -1852,12 +1852,15 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,cpio,2.11-28.amzn2,amaz rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38039,HIGH,https://avd.aquasec.com/nvd/cve-2023-38039,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38545,HIGH,https://avd.aquasec.com/nvd/cve-2023-38545,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.4,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38546,HIGH,https://avd.aquasec.com/nvd/cve-2023-38546,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.4,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2022-23990,CRITICAL,https://avd.aquasec.com/nvd/cve-2022-23990,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2022-25313,CRITICAL,https://avd.aquasec.com/nvd/cve-2022-25313,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2024-45490,HIGH,https://avd.aquasec.com/nvd/cve-2024-45490,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.4,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2018-16428,HIGH,https://avd.aquasec.com/nvd/cve-2018-16428,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2018-16429,HIGH,https://avd.aquasec.com/nvd/cve-2018-16429,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2020-35457,HIGH,https://avd.aquasec.com/nvd/cve-2020-35457,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.8,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2021-28153,HIGH,https://avd.aquasec.com/nvd/cve-2021-28153,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2021-3800,HIGH,https://avd.aquasec.com/nvd/cve-2021-3800,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.5,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2023-32636,HIGH,https://avd.aquasec.com/nvd/cve-2023-32636,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.9,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2023-32643,HIGH,https://avd.aquasec.com/nvd/cve-2023-32643,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glibc,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glibc-common,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,glibc-langpack-en,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, @@ -1902,9 +1905,11 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,openssl-libs,1:1.0.2k-2 rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,openssl-libs,1:1.0.2k-24.amzn2.0.4,amazon,CVE-2023-0286,HIGH,https://avd.aquasec.com/nvd/cve-2023-0286,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),1:1.0.2k-24.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python,2.7.18-1.amzn2.0.5,amazon,CVE-2022-45061,HIGH,https://avd.aquasec.com/nvd/cve-2022-45061,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python,2.7.18-1.amzn2.0.5,amazon,CVE-2022-48565,HIGH,https://avd.aquasec.com/nvd/cve-2022-48565,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python,2.7.18-1.amzn2.0.5,amazon,CVE-2023-24329,HIGH,https://avd.aquasec.com/nvd/cve-2023-24329,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python,2.7.18-1.amzn2.0.5,amazon,CVE-2023-27043,HIGH,https://avd.aquasec.com/nvd/cve-2023-27043,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2022-45061,HIGH,https://avd.aquasec.com/nvd/cve-2022-45061,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2022-48565,HIGH,https://avd.aquasec.com/nvd/cve-2022-48565,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2023-24329,HIGH,https://avd.aquasec.com/nvd/cve-2023-24329,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2023-27043,HIGH,https://avd.aquasec.com/nvd/cve-2023-27043,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,sqlite,3.7.17-8.amzn2.1.1,amazon,CVE-2022-35737,HIGH,https://avd.aquasec.com/nvd/cve-2022-35737,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),3.7.17-8.amzn2.1.2,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2021-3236,HIGH,https://avd.aquasec.com/nvd/cve-2021-3236,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -1924,15 +1929,17 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.am rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3324,HIGH,https://avd.aquasec.com/nvd/cve-2022-3324,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3352,HIGH,https://avd.aquasec.com/nvd/cve-2022-3352,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3491,HIGH,https://avd.aquasec.com/nvd/cve-2022-3491,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4141,HIGH,https://avd.aquasec.com/nvd/cve-2022-4141,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1006-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4292,HIGH,https://avd.aquasec.com/nvd/cve-2022-4292,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-47024,HIGH,https://avd.aquasec.com/nvd/cve-2022-47024,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0049,HIGH,https://avd.aquasec.com/nvd/cve-2023-0049,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0051,HIGH,https://avd.aquasec.com/nvd/cve-2023-0051,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0054,HIGH,https://avd.aquasec.com/nvd/cve-2023-0054,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0288,HIGH,https://avd.aquasec.com/nvd/cve-2023-0288,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0433,HIGH,https://avd.aquasec.com/nvd/cve-2023-0433,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0512,HIGH,https://avd.aquasec.com/nvd/cve-2023-0512,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1127,HIGH,https://avd.aquasec.com/nvd/cve-2023-1127,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1367-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1170,HIGH,https://avd.aquasec.com/nvd/cve-2023-1170,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1175,HIGH,https://avd.aquasec.com/nvd/cve-2023-1175,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1264,HIGH,https://avd.aquasec.com/nvd/cve-2023-1264,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1355,HIGH,https://avd.aquasec.com/nvd/cve-2023-1355,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2609,HIGH,https://avd.aquasec.com/nvd/cve-2023-2609,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2610,HIGH,https://avd.aquasec.com/nvd/cve-2023-2610,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-4733,HIGH,https://avd.aquasec.com/nvd/cve-2023-4733,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -1960,15 +1967,17 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1 rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3324,HIGH,https://avd.aquasec.com/nvd/cve-2022-3324,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3352,HIGH,https://avd.aquasec.com/nvd/cve-2022-3352,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3491,HIGH,https://avd.aquasec.com/nvd/cve-2022-3491,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4141,HIGH,https://avd.aquasec.com/nvd/cve-2022-4141,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1006-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4292,HIGH,https://avd.aquasec.com/nvd/cve-2022-4292,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-47024,HIGH,https://avd.aquasec.com/nvd/cve-2022-47024,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0049,HIGH,https://avd.aquasec.com/nvd/cve-2023-0049,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0051,HIGH,https://avd.aquasec.com/nvd/cve-2023-0051,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0054,HIGH,https://avd.aquasec.com/nvd/cve-2023-0054,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0288,HIGH,https://avd.aquasec.com/nvd/cve-2023-0288,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0433,HIGH,https://avd.aquasec.com/nvd/cve-2023-0433,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0512,HIGH,https://avd.aquasec.com/nvd/cve-2023-0512,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1127,HIGH,https://avd.aquasec.com/nvd/cve-2023-1127,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1367-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1170,HIGH,https://avd.aquasec.com/nvd/cve-2023-1170,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1175,HIGH,https://avd.aquasec.com/nvd/cve-2023-1175,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1264,HIGH,https://avd.aquasec.com/nvd/cve-2023-1264,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1355,HIGH,https://avd.aquasec.com/nvd/cve-2023-1355,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2609,HIGH,https://avd.aquasec.com/nvd/cve-2023-2609,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2610,HIGH,https://avd.aquasec.com/nvd/cve-2023-2610,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8-head,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-4733,HIGH,https://avd.aquasec.com/nvd/cve-2023-4733,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -3536,7 +3545,6 @@ rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56759,HIGH,https://avd.aquasec.com/nvd/cve-2024-56759,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56766,HIGH,https://avd.aquasec.com/nvd/cve-2024-56766,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56775,HIGH,https://avd.aquasec.com/nvd/cve-2024-56775,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56784,HIGH,https://avd.aquasec.com/nvd/cve-2024-56784,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57798,HIGH,https://avd.aquasec.com/nvd/cve-2024-57798,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57887,HIGH,https://avd.aquasec.com/nvd/cve-2024-57887,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57892,HIGH,https://avd.aquasec.com/nvd/cve-2024-57892,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, @@ -7232,8 +7240,8 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.8-head,stdlib,v1.20.13,gobi rancher/system-upgrade-controller:v0.13.4,rancher/v2.8-head,stdlib,v1.20.13,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/system-upgrade-controller,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.8-head,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.8-head,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, rancher/ui-plugin-operator:v0.1.3,rancher/v2.8-head,github.com/rancher/wrangler,v0.8.8,gobinary,CVE-2022-31249,HIGH,https://avd.aquasec.com/nvd/cve-2022-31249,usr/bin/ui-plugin-operator,"0.7.4-security1, 0.8.5-security1, 1.0.1, 0.8.11",false,not_affected,vulnerable_code_not_present rancher/ui-plugin-operator:v0.1.3,rancher/v2.8-head,golang.org/x/net,v0.19.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/bin/ui-plugin-operator,0.33.0,false,not_affected,vulnerable_code_not_present diff --git a/docs/csv/report-rancher-v2.8-head-stats.csv b/docs/csv/report-rancher-v2.8-head-stats.csv index 3f2340d..90d8e8e 100644 --- a/docs/csv/report-rancher-v2.8-head-stats.csv +++ b/docs/csv/report-rancher-v2.8-head-stats.csv @@ -87,7 +87,7 @@ rancher/longhornio-csi-node-driver-registrar:v2.3.0,0,31,31 rancher/longhornio-csi-provisioner:v2.1.2,0,39,39 rancher/longhornio-csi-resizer:v1.2.0,0,33,33 rancher/machine:v0.15.0-rancher118,0,8,8 -rancher/mirrored-amazon-aws-cli:2.9.14,2,134,136 +rancher/mirrored-amazon-aws-cli:2.9.14,1,144,145 rancher/mirrored-appscode-kubed:v0.13.2,1,25,26 rancher/mirrored-bci-busybox:15.6.24.2,0,0,0 rancher/mirrored-bci-micro:15.6.24.2,0,0,0 @@ -204,7 +204,7 @@ rancher/mirrored-epinio-epinio-unpacker:v1.10.0,0,8,8 rancher/mirrored-flannel-flannel:v0.21.4,3,21,24 rancher/mirrored-flannel-flannel:v0.24.2,0,5,5 rancher/mirrored-fluent-fluent-bit:3.0.4,5,13,18 -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,617,639 +rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,616,638 rancher/mirrored-grafana-grafana-image-renderer:3.10.5,4,18,22 rancher/mirrored-grafana-grafana:10.4.9,0,0,0 rancher/mirrored-idealista-prom2teams:4.2.1,3,34,37 @@ -360,5 +360,5 @@ rancher/system-agent-installer-rke2:v1.27.16-rke2r2,0,0,0 rancher/system-agent-installer-rke2:v1.28.15-rke2r1,0,0,0 rancher/system-agent:v0.3.10-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 rancher/ui-plugin-operator:v0.1.3,0,0,0 diff --git a/docs/csv/report-rancher-v2.8.12-cves.csv b/docs/csv/report-rancher-v2.8.12-cves.csv index 6e12025..727b969 100644 --- a/docs/csv/report-rancher-v2.8.12-cves.csv +++ b/docs/csv/report-rancher-v2.8.12-cves.csv @@ -1852,12 +1852,15 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,cpio,2.11-28.amzn2,amazon rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38039,HIGH,https://avd.aquasec.com/nvd/cve-2023-38039,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38545,HIGH,https://avd.aquasec.com/nvd/cve-2023-38545,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.4,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,curl,7.79.1-7.amzn2.0.1,amazon,CVE-2023-38546,HIGH,https://avd.aquasec.com/nvd/cve-2023-38546,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),8.3.0-1.amzn2.0.4,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2022-23990,CRITICAL,https://avd.aquasec.com/nvd/cve-2022-23990,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2022-25313,CRITICAL,https://avd.aquasec.com/nvd/cve-2022-25313,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,expat,2.1.0-15.amzn2.0.2,amazon,CVE-2024-45490,HIGH,https://avd.aquasec.com/nvd/cve-2024-45490,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.1.0-15.amzn2.0.4,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2018-16428,HIGH,https://avd.aquasec.com/nvd/cve-2018-16428,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2018-16429,HIGH,https://avd.aquasec.com/nvd/cve-2018-16429,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.3,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2020-35457,HIGH,https://avd.aquasec.com/nvd/cve-2020-35457,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.8,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2021-28153,HIGH,https://avd.aquasec.com/nvd/cve-2021-28153,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2021-3800,HIGH,https://avd.aquasec.com/nvd/cve-2021-3800,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.5,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2023-32636,HIGH,https://avd.aquasec.com/nvd/cve-2023-32636,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.9,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glib2,2.56.1-9.amzn2.0.2,amazon,CVE-2023-32643,HIGH,https://avd.aquasec.com/nvd/cve-2023-32643,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.56.1-9.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glibc,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glibc-common,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,glibc-langpack-en,2.26-62.amzn2,amazon,CVE-2024-2961,HIGH,https://avd.aquasec.com/nvd/cve-2024-2961,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.26-64.amzn2.0.1,true,affected, @@ -1902,9 +1905,11 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,openssl-libs,1:1.0.2k-24. rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,openssl-libs,1:1.0.2k-24.amzn2.0.4,amazon,CVE-2023-0286,HIGH,https://avd.aquasec.com/nvd/cve-2023-0286,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),1:1.0.2k-24.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python,2.7.18-1.amzn2.0.5,amazon,CVE-2022-45061,HIGH,https://avd.aquasec.com/nvd/cve-2022-45061,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python,2.7.18-1.amzn2.0.5,amazon,CVE-2022-48565,HIGH,https://avd.aquasec.com/nvd/cve-2022-48565,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python,2.7.18-1.amzn2.0.5,amazon,CVE-2023-24329,HIGH,https://avd.aquasec.com/nvd/cve-2023-24329,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python,2.7.18-1.amzn2.0.5,amazon,CVE-2023-27043,HIGH,https://avd.aquasec.com/nvd/cve-2023-27043,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2022-45061,HIGH,https://avd.aquasec.com/nvd/cve-2022-45061,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2022-48565,HIGH,https://avd.aquasec.com/nvd/cve-2022-48565,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.7,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2023-24329,HIGH,https://avd.aquasec.com/nvd/cve-2023-24329,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.6,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,python-libs,2.7.18-1.amzn2.0.5,amazon,CVE-2023-27043,HIGH,https://avd.aquasec.com/nvd/cve-2023-27043,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2.7.18-1.amzn2.0.9,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,sqlite,3.7.17-8.amzn2.1.1,amazon,CVE-2022-35737,HIGH,https://avd.aquasec.com/nvd/cve-2022-35737,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),3.7.17-8.amzn2.1.2,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2021-3236,HIGH,https://avd.aquasec.com/nvd/cve-2021-3236,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -1924,15 +1929,17 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3324,HIGH,https://avd.aquasec.com/nvd/cve-2022-3324,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3352,HIGH,https://avd.aquasec.com/nvd/cve-2022-3352,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3491,HIGH,https://avd.aquasec.com/nvd/cve-2022-3491,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4141,HIGH,https://avd.aquasec.com/nvd/cve-2022-4141,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1006-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4292,HIGH,https://avd.aquasec.com/nvd/cve-2022-4292,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-47024,HIGH,https://avd.aquasec.com/nvd/cve-2022-47024,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0049,HIGH,https://avd.aquasec.com/nvd/cve-2023-0049,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0051,HIGH,https://avd.aquasec.com/nvd/cve-2023-0051,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0054,HIGH,https://avd.aquasec.com/nvd/cve-2023-0054,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0288,HIGH,https://avd.aquasec.com/nvd/cve-2023-0288,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0433,HIGH,https://avd.aquasec.com/nvd/cve-2023-0433,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0512,HIGH,https://avd.aquasec.com/nvd/cve-2023-0512,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1127,HIGH,https://avd.aquasec.com/nvd/cve-2023-1127,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1367-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1170,HIGH,https://avd.aquasec.com/nvd/cve-2023-1170,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1175,HIGH,https://avd.aquasec.com/nvd/cve-2023-1175,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1264,HIGH,https://avd.aquasec.com/nvd/cve-2023-1264,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1355,HIGH,https://avd.aquasec.com/nvd/cve-2023-1355,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2609,HIGH,https://avd.aquasec.com/nvd/cve-2023-2609,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2610,HIGH,https://avd.aquasec.com/nvd/cve-2023-2610,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-data,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-4733,HIGH,https://avd.aquasec.com/nvd/cve-2023-4733,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -1960,15 +1967,17 @@ rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.a rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3324,HIGH,https://avd.aquasec.com/nvd/cve-2022-3324,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3352,HIGH,https://avd.aquasec.com/nvd/cve-2022-3352,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-3491,HIGH,https://avd.aquasec.com/nvd/cve-2022-3491,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4141,HIGH,https://avd.aquasec.com/nvd/cve-2022-4141,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1006-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-4292,HIGH,https://avd.aquasec.com/nvd/cve-2022-4292,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2022-47024,HIGH,https://avd.aquasec.com/nvd/cve-2022-47024,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, -rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0049,HIGH,https://avd.aquasec.com/nvd/cve-2023-0049,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1160-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0051,HIGH,https://avd.aquasec.com/nvd/cve-2023-0051,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0054,HIGH,https://avd.aquasec.com/nvd/cve-2023-0054,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0288,HIGH,https://avd.aquasec.com/nvd/cve-2023-0288,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0433,HIGH,https://avd.aquasec.com/nvd/cve-2023-0433,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-0512,HIGH,https://avd.aquasec.com/nvd/cve-2023-0512,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1314-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1127,HIGH,https://avd.aquasec.com/nvd/cve-2023-1127,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1367-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1170,HIGH,https://avd.aquasec.com/nvd/cve-2023-1170,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1175,HIGH,https://avd.aquasec.com/nvd/cve-2023-1175,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1264,HIGH,https://avd.aquasec.com/nvd/cve-2023-1264,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, +rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-1355,HIGH,https://avd.aquasec.com/nvd/cve-2023-1355,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1403-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2609,HIGH,https://avd.aquasec.com/nvd/cve-2023-2609,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-2610,HIGH,https://avd.aquasec.com/nvd/cve-2023-2610,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1592-1.amzn2.0.1,true,affected, rancher/mirrored-amazon-aws-cli:2.9.14,rancher/v2.8.12,vim-minimal,2:9.0.828-1.amzn2.0.1,amazon,CVE-2023-4733,HIGH,https://avd.aquasec.com/nvd/cve-2023-4733,rancher/mirrored-amazon-aws-cli:2.9.14 (amazon 2 (Karoo)),2:9.0.1882-1.amzn2.0.1,true,affected, @@ -3536,7 +3545,6 @@ rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5. rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-56759,HIGH,https://avd.aquasec.com/nvd/cve-2024-56759,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-56766,HIGH,https://avd.aquasec.com/nvd/cve-2024-56766,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-56775,HIGH,https://avd.aquasec.com/nvd/cve-2024-56775,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-56784,HIGH,https://avd.aquasec.com/nvd/cve-2024-56784,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-57798,HIGH,https://avd.aquasec.com/nvd/cve-2024-57798,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-57887,HIGH,https://avd.aquasec.com/nvd/cve-2024-57887,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.8.12,linux-libc-dev,5.10.216-1,debian,CVE-2024-57892,HIGH,https://avd.aquasec.com/nvd/cve-2024-57892,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, @@ -7190,8 +7198,8 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.8.12,stdlib,v1.20.13,gobina rancher/system-upgrade-controller:v0.13.4,rancher/v2.8.12,stdlib,v1.20.13,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/system-upgrade-controller,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.8.12,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.8.12,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8.12,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8.12,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.8.12,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8.12,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8.12,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.8.12,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, rancher/ui-plugin-operator:v0.1.3,rancher/v2.8.12,github.com/rancher/wrangler,v0.8.8,gobinary,CVE-2022-31249,HIGH,https://avd.aquasec.com/nvd/cve-2022-31249,usr/bin/ui-plugin-operator,"0.7.4-security1, 0.8.5-security1, 1.0.1, 0.8.11",false,not_affected,vulnerable_code_not_present rancher/ui-plugin-operator:v0.1.3,rancher/v2.8.12,golang.org/x/net,v0.19.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,usr/bin/ui-plugin-operator,0.33.0,false,not_affected,vulnerable_code_not_present diff --git a/docs/csv/report-rancher-v2.8.12-stats.csv b/docs/csv/report-rancher-v2.8.12-stats.csv index 987a1a4..55a6a38 100644 --- a/docs/csv/report-rancher-v2.8.12-stats.csv +++ b/docs/csv/report-rancher-v2.8.12-stats.csv @@ -87,7 +87,7 @@ rancher/longhornio-csi-node-driver-registrar:v2.3.0,0,31,31 rancher/longhornio-csi-provisioner:v2.1.2,0,39,39 rancher/longhornio-csi-resizer:v1.2.0,0,33,33 rancher/machine:v0.15.0-rancher118,0,8,8 -rancher/mirrored-amazon-aws-cli:2.9.14,2,134,136 +rancher/mirrored-amazon-aws-cli:2.9.14,1,144,145 rancher/mirrored-appscode-kubed:v0.13.2,1,25,26 rancher/mirrored-bci-busybox:15.6.24.2,0,0,0 rancher/mirrored-bci-micro:15.6.24.2,0,0,0 @@ -204,7 +204,7 @@ rancher/mirrored-epinio-epinio-unpacker:v1.10.0,0,8,8 rancher/mirrored-flannel-flannel:v0.21.4,3,21,24 rancher/mirrored-flannel-flannel:v0.24.2,0,5,5 rancher/mirrored-fluent-fluent-bit:3.0.4,5,13,18 -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,617,639 +rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,616,638 rancher/mirrored-grafana-grafana-image-renderer:3.10.5,4,18,22 rancher/mirrored-grafana-grafana:10.4.9,0,0,0 rancher/mirrored-idealista-prom2teams:4.2.1,3,34,37 @@ -360,5 +360,5 @@ rancher/system-agent-installer-rke2:v1.27.16-rke2r2,0,0,0 rancher/system-agent-installer-rke2:v1.28.15-rke2r1,0,0,0 rancher/system-agent:v0.3.10-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 rancher/ui-plugin-operator:v0.1.3,0,0,0 diff --git a/docs/csv/report-rancher-v2.9-head-cves.csv b/docs/csv/report-rancher-v2.9-head-cves.csv index 3684f1d..04c7e32 100644 --- a/docs/csv/report-rancher-v2.9-head-cves.csv +++ b/docs/csv/report-rancher-v2.9-head-cves.csv @@ -1818,45 +1818,6 @@ rancher/kubectl:v1.20.2,rancher/v2.9-head,stdlib,v1.15.5,gobinary,CVE-2023-45283 rancher/kubectl:v1.20.2,rancher/v2.9-head,stdlib,v1.15.5,gobinary,CVE-2023-45287,HIGH,https://avd.aquasec.com/nvd/cve-2023-45287,bin/kubectl,1.20.0,false,affected, rancher/kubectl:v1.20.2,rancher/v2.9-head,stdlib,v1.15.5,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/kubectl,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score rancher/kubectl:v1.20.2,rancher/v2.9-head,stdlib,v1.15.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/kubectl,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-23806,HIGH,https://avd.aquasec.com/nvd/cve-2022-23806,bin/kubectl,"1.16.14, 1.17.7",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24538,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24538,bin/kubectl,"1.19.8, 1.20.3",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24540,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24540,bin/kubectl,"1.19.9, 1.20.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2024-24790,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-24790,bin/kubectl,"1.21.11, 1.22.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-23772,HIGH,https://avd.aquasec.com/nvd/cve-2022-23772,bin/kubectl,"1.16.14, 1.17.7",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-24675,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-24675,bin/kubectl,"1.17.9, 1.18.1",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-24921,HIGH,https://avd.aquasec.com/nvd/cve-2022-24921,bin/kubectl,"1.16.15, 1.17.8",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-27664,HIGH,https://avd.aquasec.com/nvd/cve-2022-27664,bin/kubectl,"1.18.6, 1.19.1",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-28131,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-28131,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-28327,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-28327,bin/kubectl,"1.17.9, 1.18.1",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-2879,HIGH,https://avd.aquasec.com/nvd/cve-2022-2879,bin/kubectl,"1.18.7, 1.19.2",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-2880,HIGH,https://avd.aquasec.com/nvd/cve-2022-2880,bin/kubectl,"1.18.7, 1.19.2",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-29804,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-29804,bin/kubectl,"1.17.11, 1.18.3",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30580,HIGH,https://avd.aquasec.com/nvd/cve-2022-30580,bin/kubectl,"1.17.11, 1.18.3",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30630,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30630,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30631,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30631,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30632,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30632,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30633,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30633,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30634,LOW,https://avd.aquasec.com/nvd/cve-2022-30634,bin/kubectl,"1.17.11, 1.18.3",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-30635,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30635,bin/kubectl,"1.17.12, 1.18.4",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-32189,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-32189,bin/kubectl,"1.17.13, 1.18.5",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41715,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-41715,bin/kubectl,"1.18.7, 1.19.2",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41716,UNKNOWN,https://avd.aquasec.com/nvd/cve-2022-41716,bin/kubectl,"1.18.8, 1.19.3",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41720,HIGH,https://avd.aquasec.com/nvd/cve-2022-41720,bin/kubectl,"1.18.9, 1.19.4",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41722,HIGH,https://avd.aquasec.com/nvd/cve-2022-41722,bin/kubectl,"1.19.6, 1.20.1",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41723,HIGH,https://avd.aquasec.com/nvd/cve-2022-41723,bin/kubectl,"1.19.6, 1.20.1",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41724,HIGH,https://avd.aquasec.com/nvd/cve-2022-41724,bin/kubectl,"1.19.6, 1.20.1",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2022-41725,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-41725,bin/kubectl,"1.19.6, 1.20.1",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24534,HIGH,https://avd.aquasec.com/nvd/cve-2023-24534,bin/kubectl,"1.19.8, 1.20.3",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24536,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24536,bin/kubectl,"1.19.8, 1.20.3",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24537,HIGH,https://avd.aquasec.com/nvd/cve-2023-24537,bin/kubectl,"1.19.8, 1.20.3",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-24539,HIGH,https://avd.aquasec.com/nvd/cve-2023-24539,bin/kubectl,"1.19.9, 1.20.4",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-29400,HIGH,https://avd.aquasec.com/nvd/cve-2023-29400,bin/kubectl,"1.19.9, 1.20.4",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-29403,HIGH,https://avd.aquasec.com/nvd/cve-2023-29403,bin/kubectl,"1.19.10, 1.20.5",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-39325,HIGH,https://avd.aquasec.com/nvd/cve-2023-39325,bin/kubectl,"1.20.10, 1.21.3",false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-45283,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45283,bin/kubectl,"1.20.11, 1.21.4, 1.20.12, 1.21.5",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-45287,HIGH,https://avd.aquasec.com/nvd/cve-2023-45287,bin/kubectl,1.20.0,false,affected, -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/kubectl,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score -rancher/kubectl:v1.22.6,rancher/v2.9-head,stdlib,v1.16.12,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/kubectl,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/kubectl:v1.23.3,rancher/v2.9-head,stdlib,v1.17.6,gobinary,CVE-2022-23806,HIGH,https://avd.aquasec.com/nvd/cve-2022-23806,bin/kubectl,"1.16.14, 1.17.7",false,affected,severity_changed_due_to_suse_cvss_score rancher/kubectl:v1.23.3,rancher/v2.9-head,stdlib,v1.17.6,gobinary,CVE-2023-24538,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24538,bin/kubectl,"1.19.8, 1.20.3",false,affected,severity_changed_due_to_suse_cvss_score rancher/kubectl:v1.23.3,rancher/v2.9-head,stdlib,v1.17.6,gobinary,CVE-2023-24540,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24540,bin/kubectl,"1.19.9, 1.20.4",false,affected,severity_changed_due_to_suse_cvss_score @@ -3715,7 +3676,6 @@ rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56759,HIGH,https://avd.aquasec.com/nvd/cve-2024-56759,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56766,HIGH,https://avd.aquasec.com/nvd/cve-2024-56766,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56775,HIGH,https://avd.aquasec.com/nvd/cve-2024-56775,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-56784,HIGH,https://avd.aquasec.com/nvd/cve-2024-56784,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57798,HIGH,https://avd.aquasec.com/nvd/cve-2024-57798,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57887,HIGH,https://avd.aquasec.com/nvd/cve-2024-57887,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9-head,linux-libc-dev,5.10.216-1,debian,CVE-2024-57892,HIGH,https://avd.aquasec.com/nvd/cve-2024-57892,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, @@ -5033,55 +4993,6 @@ rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2,rancher/v2.9-hea rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2,rancher/v2.9-head,golang.org/x/net,v0.8.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,snapshot-validation-webhook,0.33.0,true,not_affected,vulnerable_code_not_present rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0,rancher/v2.9-head,stdlib,v1.22.5,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,snapshot-validation-webhook,"1.22.7, 1.23.1",true,affected,severity_changed_due_to_suse_cvss_score rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0,rancher/v2.9-head,golang.org/x/net,v0.28.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,snapshot-validation-webhook,0.33.0,true,not_affected,vulnerable_code_not_present -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/net,v0.0.0-20210224082022-3d97a244fca7,gobinary,CVE-2021-33194,HIGH,https://avd.aquasec.com/nvd/cve-2021-33194,admission-webhook/admission-webhook,0.0.0-20210520170846-37e1c6afe023,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/net,v0.0.0-20210224082022-3d97a244fca7,gobinary,CVE-2022-27664,HIGH,https://avd.aquasec.com/nvd/cve-2022-27664,admission-webhook/admission-webhook,0.0.0-20220906165146-f3363e06e74c,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/net,v0.0.0-20210224082022-3d97a244fca7,gobinary,CVE-2022-41723,HIGH,https://avd.aquasec.com/nvd/cve-2022-41723,admission-webhook/admission-webhook,0.7.0,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/net,v0.0.0-20210224082022-3d97a244fca7,gobinary,CVE-2023-39325,HIGH,https://avd.aquasec.com/nvd/cve-2023-39325,admission-webhook/admission-webhook,0.17.0,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/net,v0.0.0-20210224082022-3d97a244fca7,gobinary,CVE-2024-45338,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-45338,admission-webhook/admission-webhook,0.33.0,true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/text,v0.3.4,gobinary,CVE-2021-38561,HIGH,https://avd.aquasec.com/nvd/cve-2021-38561,admission-webhook/admission-webhook,0.3.7,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,golang.org/x/text,v0.3.4,gobinary,CVE-2022-32149,HIGH,https://avd.aquasec.com/nvd/cve-2022-32149,admission-webhook/admission-webhook,0.3.8,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-23806,HIGH,https://avd.aquasec.com/nvd/cve-2022-23806,admission-webhook/admission-webhook,"1.16.14, 1.17.7",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24538,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24538,admission-webhook/admission-webhook,"1.19.8, 1.20.3",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24540,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24540,admission-webhook/admission-webhook,"1.19.9, 1.20.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2024-24790,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-24790,admission-webhook/admission-webhook,"1.21.11, 1.22.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2021-41771,HIGH,https://avd.aquasec.com/nvd/cve-2021-41771,admission-webhook/admission-webhook,"1.16.10, 1.17.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2021-41772,HIGH,https://avd.aquasec.com/nvd/cve-2021-41772,admission-webhook/admission-webhook,"1.16.10, 1.17.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2021-44716,HIGH,https://avd.aquasec.com/nvd/cve-2021-44716,admission-webhook/admission-webhook,"1.16.12, 1.17.5",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-23772,HIGH,https://avd.aquasec.com/nvd/cve-2022-23772,admission-webhook/admission-webhook,"1.16.14, 1.17.7",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-24675,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-24675,admission-webhook/admission-webhook,"1.17.9, 1.18.1",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-24921,HIGH,https://avd.aquasec.com/nvd/cve-2022-24921,admission-webhook/admission-webhook,"1.16.15, 1.17.8",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-27664,HIGH,https://avd.aquasec.com/nvd/cve-2022-27664,admission-webhook/admission-webhook,"1.18.6, 1.19.1",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-28131,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-28131,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-28327,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-28327,admission-webhook/admission-webhook,"1.17.9, 1.18.1",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-2879,HIGH,https://avd.aquasec.com/nvd/cve-2022-2879,admission-webhook/admission-webhook,"1.18.7, 1.19.2",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-2880,HIGH,https://avd.aquasec.com/nvd/cve-2022-2880,admission-webhook/admission-webhook,"1.18.7, 1.19.2",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-29804,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-29804,admission-webhook/admission-webhook,"1.17.11, 1.18.3",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30580,HIGH,https://avd.aquasec.com/nvd/cve-2022-30580,admission-webhook/admission-webhook,"1.17.11, 1.18.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30630,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30630,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30631,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30631,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30632,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30632,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30633,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30633,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30634,LOW,https://avd.aquasec.com/nvd/cve-2022-30634,admission-webhook/admission-webhook,"1.17.11, 1.18.3",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-30635,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-30635,admission-webhook/admission-webhook,"1.17.12, 1.18.4",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-32189,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-32189,admission-webhook/admission-webhook,"1.17.13, 1.18.5",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41715,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-41715,admission-webhook/admission-webhook,"1.18.7, 1.19.2",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41716,UNKNOWN,https://avd.aquasec.com/nvd/cve-2022-41716,admission-webhook/admission-webhook,"1.18.8, 1.19.3",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41720,HIGH,https://avd.aquasec.com/nvd/cve-2022-41720,admission-webhook/admission-webhook,"1.18.9, 1.19.4",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41722,HIGH,https://avd.aquasec.com/nvd/cve-2022-41722,admission-webhook/admission-webhook,"1.19.6, 1.20.1",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41723,HIGH,https://avd.aquasec.com/nvd/cve-2022-41723,admission-webhook/admission-webhook,"1.19.6, 1.20.1",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41724,HIGH,https://avd.aquasec.com/nvd/cve-2022-41724,admission-webhook/admission-webhook,"1.19.6, 1.20.1",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2022-41725,MEDIUM,https://avd.aquasec.com/nvd/cve-2022-41725,admission-webhook/admission-webhook,"1.19.6, 1.20.1",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24534,HIGH,https://avd.aquasec.com/nvd/cve-2023-24534,admission-webhook/admission-webhook,"1.19.8, 1.20.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24536,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-24536,admission-webhook/admission-webhook,"1.19.8, 1.20.3",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24537,HIGH,https://avd.aquasec.com/nvd/cve-2023-24537,admission-webhook/admission-webhook,"1.19.8, 1.20.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-24539,HIGH,https://avd.aquasec.com/nvd/cve-2023-24539,admission-webhook/admission-webhook,"1.19.9, 1.20.4",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-29400,HIGH,https://avd.aquasec.com/nvd/cve-2023-29400,admission-webhook/admission-webhook,"1.19.9, 1.20.4",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-29403,HIGH,https://avd.aquasec.com/nvd/cve-2023-29403,admission-webhook/admission-webhook,"1.19.10, 1.20.5",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-39325,HIGH,https://avd.aquasec.com/nvd/cve-2023-39325,admission-webhook/admission-webhook,"1.20.10, 1.21.3",true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-45283,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45283,admission-webhook/admission-webhook,"1.20.11, 1.21.4, 1.20.12, 1.21.5",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-45287,HIGH,https://avd.aquasec.com/nvd/cve-2023-45287,admission-webhook/admission-webhook,1.20.0,true,affected, -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,admission-webhook/admission-webhook,"1.21.9, 1.22.2",true,affected,severity_changed_due_to_suse_cvss_score -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,rancher/v2.9-head,stdlib,v1.16.9,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,admission-webhook/admission-webhook,"1.22.7, 1.23.1",true,affected,severity_changed_due_to_suse_cvss_score rancher/mirrored-sonobuoy-sonobuoy:v0.57.2,rancher/v2.9-head,stdlib,v1.21.12,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,sonobuoy,"1.22.7, 1.23.1",true,affected,severity_changed_due_to_suse_cvss_score rancher/mirrored-sonobuoy-sonobuoy:v0.57.2,rancher/v2.9-head,golang.org/x/net,v0.23.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,sonobuoy,0.33.0,true,not_affected,vulnerable_code_not_present rancher/mirrored-thanos-thanos:v0.34.1,rancher/v2.9-head,stdlib,v1.21.7,gobinary,CVE-2024-24790,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-24790,bin/thanos,"1.21.11, 1.22.4",true,affected,severity_changed_due_to_suse_cvss_score @@ -5549,6 +5460,6 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.9-head,stdlib,v1.20.13,gobi rancher/system-upgrade-controller:v0.13.4,rancher/v2.9-head,stdlib,v1.20.13,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/system-upgrade-controller,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.9-head,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.9-head,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9-head,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9-head,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9-head,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, diff --git a/docs/csv/report-rancher-v2.9-head-stats.csv b/docs/csv/report-rancher-v2.9-head-stats.csv index 5e2c5b7..9f56573 100644 --- a/docs/csv/report-rancher-v2.9-head-stats.csv +++ b/docs/csv/report-rancher-v2.9-head-stats.csv @@ -106,7 +106,6 @@ rancher/klipper-helm:v0.9.3-build20241008,0,0,0 rancher/klipper-lb:v0.4.9,0,0,0 rancher/kube-api-auth:v0.2.2,0,0,0 rancher/kubectl:v1.20.2,0,25,25 -rancher/kubectl:v1.22.6,0,18,18 rancher/kubectl:v1.23.3,0,18,18 rancher/kubectl:v1.28.12,0,0,0 rancher/kubectl:v1.29.0,0,0,0 @@ -280,7 +279,7 @@ rancher/mirrored-flannel-flannel:v0.21.4,3,21,24 rancher/mirrored-flannel-flannel:v0.24.2,0,5,5 rancher/mirrored-flannel-flannel:v0.25.1,0,4,4 rancher/mirrored-fluent-fluent-bit:3.0.4,5,13,18 -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,617,639 +rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,616,638 rancher/mirrored-grafana-grafana-image-renderer:3.10.5,4,18,22 rancher/mirrored-grafana-grafana:10.4.9,0,0,0 rancher/mirrored-idealista-prom2teams:4.2.1,3,34,37 @@ -396,7 +395,6 @@ rancher/mirrored-sig-storage-snapshot-controller:v8.1.0,0,0,0 rancher/mirrored-sig-storage-snapshot-controller:v8.2.0,0,0,0 rancher/mirrored-sig-storage-snapshot-validation-webhook:v6.2.2,0,16,16 rancher/mirrored-sig-storage-snapshot-validation-webhook:v8.1.0,0,0,0 -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0,0,27,27 rancher/mirrored-sonobuoy-sonobuoy:v0.57.2,0,0,0 rancher/mirrored-thanos-thanos:v0.34.1,0,0,0 rancher/neuvector-compliance-config:1.0.3,0,0,0 @@ -465,4 +463,4 @@ rancher/system-agent-installer-rke2:v1.29.13-rke2r1,0,0,0 rancher/system-agent-installer-rke2:v1.30.9-rke2r1,0,0,0 rancher/system-agent:v0.3.10-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 diff --git a/docs/csv/report-rancher-v2.9.6-cves.csv b/docs/csv/report-rancher-v2.9.6-cves.csv index 872d585..3550a48 100644 --- a/docs/csv/report-rancher-v2.9.6-cves.csv +++ b/docs/csv/report-rancher-v2.9.6-cves.csv @@ -3676,7 +3676,6 @@ rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.1 rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-56759,HIGH,https://avd.aquasec.com/nvd/cve-2024-56759,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-56766,HIGH,https://avd.aquasec.com/nvd/cve-2024-56766,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-56775,HIGH,https://avd.aquasec.com/nvd/cve-2024-56775,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-56784,HIGH,https://avd.aquasec.com/nvd/cve-2024-56784,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-57798,HIGH,https://avd.aquasec.com/nvd/cve-2024-57798,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-57887,HIGH,https://avd.aquasec.com/nvd/cve-2024-57887,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, rancher/mirrored-fluent-fluent-bit:3.0.4-debug,rancher/v2.9.6,linux-libc-dev,5.10.216-1,debian,CVE-2024-57892,HIGH,https://avd.aquasec.com/nvd/cve-2024-57892,rancher/mirrored-fluent-fluent-bit:3.0.4-debug (debian 11.9),,true,affected, @@ -5461,6 +5460,6 @@ rancher/system-upgrade-controller:v0.13.4,rancher/v2.9.6,stdlib,v1.20.13,gobinar rancher/system-upgrade-controller:v0.13.4,rancher/v2.9.6,stdlib,v1.20.13,gobinary,CVE-2023-45288,MEDIUM,https://avd.aquasec.com/nvd/cve-2023-45288,bin/system-upgrade-controller,"1.21.9, 1.22.2",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.9.6,stdlib,v1.20.13,gobinary,CVE-2024-34156,MEDIUM,https://avd.aquasec.com/nvd/cve-2024-34156,bin/system-upgrade-controller,"1.22.7, 1.23.1",false,affected,severity_changed_due_to_suse_cvss_score rancher/system-upgrade-controller:v0.13.4,rancher/v2.9.6,golang.org/x/net,v0.17.0,gobinary,CVE-2024-45338,HIGH,https://avd.aquasec.com/nvd/cve-2024-45338,bin/system-upgrade-controller,0.33.0,false,not_affected,vulnerable_code_not_in_execute_path -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9.6,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9.6,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),4.13-150000.4.11.1,false,affected, -rancher/ui-plugin-catalog:3.3.3,rancher/v2.9.6,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.3.3 (sles 15.5),2.10.3-150500.5.20.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9.6,libtasn1,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9.6,libtasn1-6,4.13-150000.4.8.1,sles,SUSE-SU-2025:0548-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),4.13-150000.4.11.1,false,affected, +rancher/ui-plugin-catalog:3.4.0,rancher/v2.9.6,libxml2-2,2.10.3-150500.5.17.1,sles,SUSE-SU-2025:0348-1,HIGH,,rancher/ui-plugin-catalog:3.4.0 (sles 15.5),2.10.3-150500.5.20.1,false,affected, diff --git a/docs/csv/report-rancher-v2.9.6-stats.csv b/docs/csv/report-rancher-v2.9.6-stats.csv index 478c56c..4c694eb 100644 --- a/docs/csv/report-rancher-v2.9.6-stats.csv +++ b/docs/csv/report-rancher-v2.9.6-stats.csv @@ -279,7 +279,7 @@ rancher/mirrored-flannel-flannel:v0.21.4,3,21,24 rancher/mirrored-flannel-flannel:v0.24.2,0,5,5 rancher/mirrored-flannel-flannel:v0.25.1,0,4,4 rancher/mirrored-fluent-fluent-bit:3.0.4,5,13,18 -rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,617,639 +rancher/mirrored-fluent-fluent-bit:3.0.4-debug,22,616,638 rancher/mirrored-grafana-grafana-image-renderer:3.10.5,4,18,22 rancher/mirrored-grafana-grafana:10.4.9,0,0,0 rancher/mirrored-idealista-prom2teams:4.2.1,3,34,37 @@ -463,4 +463,4 @@ rancher/system-agent-installer-rke2:v1.29.13-rke2r1,0,0,0 rancher/system-agent-installer-rke2:v1.30.9-rke2r1,0,0,0 rancher/system-agent:v0.3.10-suc,0,0,0 rancher/system-upgrade-controller:v0.13.4,0,0,0 -rancher/ui-plugin-catalog:3.3.3,0,3,3 +rancher/ui-plugin-catalog:3.4.0,0,3,3 diff --git a/docs/harvester-master.html b/docs/harvester-master.html index 1fc2c37..14755b1 100644 --- a/docs/harvester-master.html +++ b/docs/harvester-master.html @@ -72,71 +72,71 @@

How to use this page

Type (language or OS) -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master -ip-control-loop -golang.org/x/net@v0.20.0 -CVE-2024-45338 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
+libcrypto3 +libcrypto3@3.3.1-r3 +CVE-2024-12797 +HIGH affected -gobinary +alpine -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master -ip-control-loop -stdlib@v1.21.9 -CVE-2024-24790 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
+libssl3 +libssl3@3.3.1-r3 +CVE-2024-12797 +HIGH affected -gobinary +alpine -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master ip-control-loop -stdlib@v1.21.9 -CVE-2024-34156 +golang.org/x/net@v0.24.0 +CVE-2024-45338
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master -whereabouts -golang.org/x/net@v0.20.0 -CVE-2024-45338 +ip-control-loop +stdlib@v1.21.12 +CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master whereabouts -stdlib@v1.21.9 -CVE-2024-24790 +golang.org/x/net@v0.24.0 +CVE-2024-45338
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary -ghcr.io/k8snetworkplumbingwg/whereabouts:v0.7.0 +ghcr.io/k8snetworkplumbingwg/whereabouts:v0.8.0 false Harvester master whereabouts -stdlib@v1.21.9 +stdlib@v1.21.12 CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected diff --git a/docs/index.html b/docs/index.html index 1270554..7a819b8 100644 --- a/docs/index.html +++ b/docs/index.html @@ -97,9 +97,9 @@

How to use this page

report -Longhorn v1.7.2 -report -report +Longhorn v1.7.3 +report +report Longhorn v1.7 head diff --git a/docs/longhorn-v1.7.2.html b/docs/longhorn-v1.7.2.html deleted file mode 100644 index 97661f3..0000000 --- a/docs/longhorn-v1.7.2.html +++ /dev/null @@ -1,1227 +0,0 @@ - - - - - -SUSE Rancher - Images CVE Scans - - - -

SUSE Rancher - Longhorn v1.7.2 version - CVE Scans - 2025-02-27

- -

How to use this page

- - - -
-

Search:

- -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ImageMirroredReleaseBinary/PackageDependencyVulnerability ID (CVE)SeverityStatusJustification (for status not affected)Type (language or OS)
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2glib2-toolsglib2-tools@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libgio-2_0-0libgio-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libgmodule-2_0-0libgmodule-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libgobject-2_0-0libgobject-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/backing-image-manager:v1.7.2falseLonghorn v1.7.2usr/local/bin/backing-image-managergolang.org/x/net@v0.30.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-attacher:v4.7.0falseLonghorn v1.7.2csi-attacherstdlib@v1.22.5CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/csi-attacher:v4.7.0falseLonghorn v1.7.2csi-attachergolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-node-driver-registrar:v2.12.0falseLonghorn v1.7.2csi-node-driver-registrarstdlib@v1.22.5CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/csi-node-driver-registrar:v2.12.0falseLonghorn v1.7.2csi-node-driver-registrargolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-provisioner:v4.0.1-20241007falseLonghorn v1.7.2csi-provisionerstdlib@v1.21.13CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/csi-provisioner:v4.0.1-20241007falseLonghorn v1.7.2csi-provisionergolang.org/x/net@v0.19.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-resizer:v1.12.0falseLonghorn v1.7.2csi-resizerstdlib@v1.22.5CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/csi-resizer:v1.12.0falseLonghorn v1.7.2csi-resizergolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-snapshotter:v7.0.2-20241007falseLonghorn v1.7.2csi-snapshotterstdlib@v1.21.13CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/csi-snapshotter:v7.0.2-20241007falseLonghorn v1.7.2csi-snapshottergolang.org/x/net@v0.20.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/livenessprobe:v2.14.0falseLonghorn v1.7.2livenessprobestdlib@v1.22.5CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/livenessprobe:v2.14.0falseLonghorn v1.7.2livenessprobegolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2usr/local/bin/longhornctlgolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not in execute pathgobinary
longhornio/longhorn-cli:v1.7.2falseLonghorn v1.7.2usr/local/bin/longhornctl-localgolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not in execute pathgobinary
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2libgmodule-2_0-0libgmodule-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probestdlib@v1.22.4CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probegolang.org/x/crypto@v0.24.0CVE-2024-45337nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probegolang.org/x/net@v0.26.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2usr/local/bin/longhorngolang.org/x/net@v0.30.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-engine:v1.7.2falseLonghorn v1.7.2usr/local/bin/longhorn-instance-managergolang.org/x/net@v0.30.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2libgmodule-2_0-0libgmodule-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-imgqemu-img@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-pr-helperqemu-pr-helper@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:3744-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2qemu-toolsqemu-tools@8.2.6-150600.3.15.1SUSE-SU-2024:4094-1HIGHaffectedsles
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probestdlib@v1.22.4CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probegolang.org/x/crypto@v0.24.0CVE-2024-45337nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2usr/local/bin/grpc_health_probegolang.org/x/net@v0.26.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-instance-manager:v1.7.2falseLonghorn v1.7.2usr/local/bin/longhorn-instance-managergolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2bind-utilsbind-utils@9.18.28-150600.3.3.1SUSE-SU-2025:0355-1HIGHaffectedsles
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2usr/local/sbin/longhorn-managergolang.org/x/crypto@v0.28.0CVE-2024-45337nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-manager:v1.7.2falseLonghorn v1.7.2usr/local/sbin/longhorn-managergolang.org/x/net@v0.30.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-share-manager:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-share-manager:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-share-manager:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-share-manager:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-share-manager:v1.7.2falseLonghorn v1.7.2longhorn-share-managergolang.org/x/net@v0.28.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2libxml2-toolslibxml2-tools@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/longhorn-ui:v1.7.2falseLonghorn v1.7.2nginxnginx@1.21.5-150600.8.4SUSE-SU-2025:0283-1HIGHaffectedsles
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2libglib-2_0-0libglib-2_0-0@2.78.6-150600.4.3.1SUSE-SU-2024:4254-1HIGHaffectedsles
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2libtasn1libtasn1@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2libtasn1-6libtasn1-6@4.13-150000.4.8.1SUSE-SU-2025:0548-1HIGHaffectedsles
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2libxml2-2libxml2-2@2.10.3-150500.5.17.1SUSE-SU-2025:0348-1HIGHaffectedsles
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2usr/bin/yqstdlib@v1.22.5CVE-2024-34156
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affectedgobinary
longhornio/support-bundle-kit:v0.0.45falseLonghorn v1.7.2usr/bin/yqgolang.org/x/net@v0.27.0CVE-2024-45338nonenot affectedvulnerable code not in execute pathgobinary
- -

The SUSE Rancher CVE data is provided by SUSE under the Creative -Commons license with Attribution (CC-BY-4.0). See the -license for more information.

- - - - - - diff --git a/docs/longhorn-v1.7.3.html b/docs/longhorn-v1.7.3.html new file mode 100644 index 0000000..02bc204 --- /dev/null +++ b/docs/longhorn-v1.7.3.html @@ -0,0 +1,231 @@ + + + + + +SUSE Rancher - Images CVE Scans + + + +

SUSE Rancher - Longhorn v1.7.3 version - CVE Scans - 2025-02-27

+ +

How to use this page

+ + + +
+

Search:

+ +
+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
ImageMirroredReleaseBinary/PackageDependencyVulnerability ID (CVE)SeverityStatusJustification (for status not affected)Type (language or OS)
longhornio/csi-attacher:v4.8.0falseLonghorn v1.7.3csi-attachergolang.org/x/net@v0.32.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-node-driver-registrar:v2.13.0falseLonghorn v1.7.3csi-node-driver-registrargolang.org/x/net@v0.32.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-provisioner:v4.0.1-20250204falseLonghorn v1.7.3csi-provisionergolang.org/x/net@v0.19.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/csi-snapshotter:v7.0.2-20250204falseLonghorn v1.7.3csi-snapshottergolang.org/x/net@v0.20.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
longhornio/livenessprobe:v2.15.0falseLonghorn v1.7.3livenessprobegolang.org/x/net@v0.32.0CVE-2024-45338nonenot affectedvulnerable code not presentgobinary
+ +

The SUSE Rancher CVE data is provided by SUSE under the Creative +Commons license with Attribution (CC-BY-4.0). See the +license for more information.

+ + + + + + diff --git a/docs/rancher-v2.10-head.html b/docs/rancher-v2.10-head.html index 12b8f5c..05f6a67 100644 --- a/docs/rancher-v2.10-head.html +++ b/docs/rancher-v2.10-head.html @@ -37428,7 +37428,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10 head libtasn1 @@ -37440,7 +37440,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10 head libtasn1-6 @@ -37452,7 +37452,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10 head libxml2-2 diff --git a/docs/rancher-v2.10.2.html b/docs/rancher-v2.10.2.html index 82a7d29..09be353 100644 --- a/docs/rancher-v2.10.2.html +++ b/docs/rancher-v2.10.2.html @@ -37464,7 +37464,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10.2 libtasn1 @@ -37476,7 +37476,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10.2 libtasn1-6 @@ -37488,7 +37488,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.10.2 libxml2-2 diff --git a/docs/rancher-v2.8-head.html b/docs/rancher-v2.8-head.html index 2b8a01b..0acd020 100644 --- a/docs/rancher-v2.8-head.html +++ b/docs/rancher-v2.8-head.html @@ -22313,7 +22313,7 @@

How to use this page

Rancher v2.8 head expat expat@2.1.0-15.amzn2.0.2 -CVE-2022-23990 +CVE-2022-25313 CRITICAL affected @@ -22325,8 +22325,8 @@

How to use this page

Rancher v2.8 head expat expat@2.1.0-15.amzn2.0.2 -CVE-2022-25313 -CRITICAL +CVE-2024-45490 +HIGH affected amazon @@ -22335,9 +22335,9 @@

How to use this page

rancher/mirrored-amazon-aws-cli:2.9.14 true Rancher v2.8 head -expat -expat@2.1.0-15.amzn2.0.2 -CVE-2024-45490 +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2018-16428 HIGH affected @@ -22349,7 +22349,7 @@

How to use this page

Rancher v2.8 head glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2018-16428 +CVE-2018-16429 HIGH affected @@ -22361,7 +22361,7 @@

How to use this page

Rancher v2.8 head glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2018-16429 +CVE-2020-35457 HIGH affected @@ -22373,7 +22373,43 @@

How to use this page

Rancher v2.8 head glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2020-35457 +CVE-2021-28153 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2021-3800 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2023-32636 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2023-32643 HIGH affected @@ -22913,6 +22949,18 @@

How to use this page

Rancher v2.8 head python python@2.7.18-1.amzn2.0.5 +CVE-2023-24329 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +python +python@2.7.18-1.amzn2.0.5 CVE-2023-27043 HIGH affected @@ -22949,6 +22997,18 @@

How to use this page

Rancher v2.8 head python-libs python-libs@2.7.18-1.amzn2.0.5 +CVE-2023-24329 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +python-libs +python-libs@2.7.18-1.amzn2.0.5 CVE-2023-27043 HIGH affected @@ -23177,7 +23237,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-4141 +CVE-2022-47024 HIGH affected @@ -23189,7 +23249,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-4292 +CVE-2023-0051 HIGH affected @@ -23201,7 +23261,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-47024 +CVE-2023-0054 HIGH affected @@ -23213,7 +23273,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0049 +CVE-2023-0288 HIGH affected @@ -23225,7 +23285,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0051 +CVE-2023-0433 HIGH affected @@ -23237,7 +23297,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0054 +CVE-2023-0512 HIGH affected @@ -23249,7 +23309,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0288 +CVE-2023-1127 HIGH affected @@ -23261,7 +23321,7 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0433 +CVE-2023-1170 HIGH affected @@ -23273,7 +23333,31 @@

How to use this page

Rancher v2.8 head vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0512 +CVE-2023-1175 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +vim-data +vim-data@2:9.0.828-1.amzn2.0.1 +CVE-2023-1264 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +vim-data +vim-data@2:9.0.828-1.amzn2.0.1 +CVE-2023-1355 HIGH affected @@ -23609,7 +23693,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-4141 +CVE-2022-47024 HIGH affected @@ -23621,7 +23705,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-4292 +CVE-2023-0051 HIGH affected @@ -23633,7 +23717,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-47024 +CVE-2023-0054 HIGH affected @@ -23645,7 +23729,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0049 +CVE-2023-0288 HIGH affected @@ -23657,7 +23741,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0051 +CVE-2023-0433 HIGH affected @@ -23669,7 +23753,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0054 +CVE-2023-0512 HIGH affected @@ -23681,7 +23765,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0288 +CVE-2023-1127 HIGH affected @@ -23693,7 +23777,7 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0433 +CVE-2023-1170 HIGH affected @@ -23705,7 +23789,31 @@

How to use this page

Rancher v2.8 head vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0512 +CVE-2023-1175 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +vim-minimal +vim-minimal@2:9.0.828-1.amzn2.0.1 +CVE-2023-1264 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8 head +vim-minimal +vim-minimal@2:9.0.828-1.amzn2.0.1 +CVE-2023-1355 HIGH affected @@ -42521,18 +42629,6 @@

How to use this page

Rancher v2.8 head linux-libc-dev linux-libc-dev@5.10.216-1 -CVE-2024-56784 -HIGH -affected - -debian - - -rancher/mirrored-fluent-fluent-bit:3.0.4-debug -true -Rancher v2.8 head -linux-libc-dev -linux-libc-dev@5.10.216-1 CVE-2024-57798 HIGH affected @@ -86868,7 +86964,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8 head libtasn1 @@ -86880,7 +86976,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8 head libtasn1-6 @@ -86892,7 +86988,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8 head libxml2-2 diff --git a/docs/rancher-v2.8.12.html b/docs/rancher-v2.8.12.html index 5747261..1f04258 100644 --- a/docs/rancher-v2.8.12.html +++ b/docs/rancher-v2.8.12.html @@ -22313,7 +22313,7 @@

How to use this page

Rancher v2.8.12 expat expat@2.1.0-15.amzn2.0.2 -CVE-2022-23990 +CVE-2022-25313 CRITICAL affected @@ -22325,8 +22325,8 @@

How to use this page

Rancher v2.8.12 expat expat@2.1.0-15.amzn2.0.2 -CVE-2022-25313 -CRITICAL +CVE-2024-45490 +HIGH affected amazon @@ -22335,9 +22335,9 @@

How to use this page

rancher/mirrored-amazon-aws-cli:2.9.14 true Rancher v2.8.12 -expat -expat@2.1.0-15.amzn2.0.2 -CVE-2024-45490 +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2018-16428 HIGH affected @@ -22349,7 +22349,7 @@

How to use this page

Rancher v2.8.12 glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2018-16428 +CVE-2018-16429 HIGH affected @@ -22361,7 +22361,7 @@

How to use this page

Rancher v2.8.12 glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2018-16429 +CVE-2020-35457 HIGH affected @@ -22373,7 +22373,43 @@

How to use this page

Rancher v2.8.12 glib2 glib2@2.56.1-9.amzn2.0.2 -CVE-2020-35457 +CVE-2021-28153 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2021-3800 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2023-32636 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +glib2 +glib2@2.56.1-9.amzn2.0.2 +CVE-2023-32643 HIGH affected @@ -22913,6 +22949,18 @@

How to use this page

Rancher v2.8.12 python python@2.7.18-1.amzn2.0.5 +CVE-2023-24329 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +python +python@2.7.18-1.amzn2.0.5 CVE-2023-27043 HIGH affected @@ -22949,6 +22997,18 @@

How to use this page

Rancher v2.8.12 python-libs python-libs@2.7.18-1.amzn2.0.5 +CVE-2023-24329 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +python-libs +python-libs@2.7.18-1.amzn2.0.5 CVE-2023-27043 HIGH affected @@ -23177,7 +23237,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-4141 +CVE-2022-47024 HIGH affected @@ -23189,7 +23249,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-4292 +CVE-2023-0051 HIGH affected @@ -23201,7 +23261,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2022-47024 +CVE-2023-0054 HIGH affected @@ -23213,7 +23273,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0049 +CVE-2023-0288 HIGH affected @@ -23225,7 +23285,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0051 +CVE-2023-0433 HIGH affected @@ -23237,7 +23297,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0054 +CVE-2023-0512 HIGH affected @@ -23249,7 +23309,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0288 +CVE-2023-1127 HIGH affected @@ -23261,7 +23321,7 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0433 +CVE-2023-1170 HIGH affected @@ -23273,7 +23333,31 @@

How to use this page

Rancher v2.8.12 vim-data vim-data@2:9.0.828-1.amzn2.0.1 -CVE-2023-0512 +CVE-2023-1175 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +vim-data +vim-data@2:9.0.828-1.amzn2.0.1 +CVE-2023-1264 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +vim-data +vim-data@2:9.0.828-1.amzn2.0.1 +CVE-2023-1355 HIGH affected @@ -23609,7 +23693,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-4141 +CVE-2022-47024 HIGH affected @@ -23621,7 +23705,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-4292 +CVE-2023-0051 HIGH affected @@ -23633,7 +23717,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2022-47024 +CVE-2023-0054 HIGH affected @@ -23645,7 +23729,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0049 +CVE-2023-0288 HIGH affected @@ -23657,7 +23741,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0051 +CVE-2023-0433 HIGH affected @@ -23669,7 +23753,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0054 +CVE-2023-0512 HIGH affected @@ -23681,7 +23765,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0288 +CVE-2023-1127 HIGH affected @@ -23693,7 +23777,7 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0433 +CVE-2023-1170 HIGH affected @@ -23705,7 +23789,31 @@

How to use this page

Rancher v2.8.12 vim-minimal vim-minimal@2:9.0.828-1.amzn2.0.1 -CVE-2023-0512 +CVE-2023-1175 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +vim-minimal +vim-minimal@2:9.0.828-1.amzn2.0.1 +CVE-2023-1264 +HIGH +affected + +amazon + + +rancher/mirrored-amazon-aws-cli:2.9.14 +true +Rancher v2.8.12 +vim-minimal +vim-minimal@2:9.0.828-1.amzn2.0.1 +CVE-2023-1355 HIGH affected @@ -42521,18 +42629,6 @@

How to use this page

Rancher v2.8.12 linux-libc-dev linux-libc-dev@5.10.216-1 -CVE-2024-56784 -HIGH -affected - -debian - - -rancher/mirrored-fluent-fluent-bit:3.0.4-debug -true -Rancher v2.8.12 -linux-libc-dev -linux-libc-dev@5.10.216-1 CVE-2024-57798 HIGH affected @@ -86364,7 +86460,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8.12 libtasn1 @@ -86376,7 +86472,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8.12 libtasn1-6 @@ -86388,7 +86484,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.8.12 libxml2-2 diff --git a/docs/rancher-v2.9-head.html b/docs/rancher-v2.9-head.html index e2cb7e0..297328a 100644 --- a/docs/rancher-v2.9-head.html +++ b/docs/rancher-v2.9-head.html @@ -21900,474 +21900,6 @@

How to use this page

gobinary -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-23806 -
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24538 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24540 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2024-24790 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-23772 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-24675 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-24921 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-27664 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-28131 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-28327 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-2879 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-2880 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-29804 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30580 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30630 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30631 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30632 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30633 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30634 -
LOW*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-30635 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-32189 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41715 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41716 -
UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41720 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41722 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41723 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41724 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2022-41725 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24534 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24536 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24537 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-24539 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-29400 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-29403 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-39325 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-45283 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-45287 -HIGH -affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2023-45288 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/kubectl:v1.22.6 -false -Rancher v2.9 head -bin/kubectl -stdlib@v1.16.12 -CVE-2024-34156 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - rancher/kubectl:v1.23.3 false Rancher v2.9 head @@ -44669,18 +44201,6 @@

How to use this page

Rancher v2.9 head linux-libc-dev linux-libc-dev@5.10.216-1 -CVE-2024-56784 -HIGH -affected - -debian - - -rancher/mirrored-fluent-fluent-bit:3.0.4-debug -true -Rancher v2.9 head -linux-libc-dev -linux-libc-dev@5.10.216-1 CVE-2024-57798 HIGH affected @@ -60480,594 +60000,6 @@

How to use this page

gobinary -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 -CVE-2021-33194 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 -CVE-2022-27664 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 -CVE-2022-41723 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 -CVE-2023-39325 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/net@v0.0.0-20210224082022-3d97a244fca7 -CVE-2024-45338 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/text@v0.3.4 -CVE-2021-38561 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -golang.org/x/text@v0.3.4 -CVE-2022-32149 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-23806 -
HIGH*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24538 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24540 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2024-24790 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2021-41771 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2021-41772 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2021-44716 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-23772 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-24675 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-24921 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-27664 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-28131 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-28327 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-2879 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-2880 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-29804 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30580 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30630 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30631 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30632 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30633 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30634 -
LOW*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-30635 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-32189 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41715 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41716 -
UNKNOWN*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41720 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41722 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41723 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41724 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2022-41725 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24534 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24536 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24537 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-24539 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-29400 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-29403 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-39325 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-45283 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-45287 -HIGH -affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2023-45288 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - -rancher/mirrored-sigwindowstools-k8s-gmsa-webhook:v0.3.0 -true -Rancher v2.9 head -admission-webhook/admission-webhook -stdlib@v1.16.9 -CVE-2024-34156 -
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
-affected - -gobinary - - rancher/mirrored-sonobuoy-sonobuoy:v0.57.2 true Rancher v2.9 head @@ -66672,7 +65604,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9 head libtasn1 @@ -66684,7 +65616,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9 head libtasn1-6 @@ -66696,7 +65628,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9 head libxml2-2 diff --git a/docs/rancher-v2.9.6.html b/docs/rancher-v2.9.6.html index 80ffa8b..ba2ee72 100644 --- a/docs/rancher-v2.9.6.html +++ b/docs/rancher-v2.9.6.html @@ -44201,18 +44201,6 @@

How to use this page

Rancher v2.9.6 linux-libc-dev linux-libc-dev@5.10.216-1 -CVE-2024-56784 -HIGH -affected - -debian - - -rancher/mirrored-fluent-fluent-bit:3.0.4-debug -true -Rancher v2.9.6 -linux-libc-dev -linux-libc-dev@5.10.216-1 CVE-2024-57798 HIGH affected @@ -65616,7 +65604,7 @@

How to use this page

gobinary -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9.6 libtasn1 @@ -65628,7 +65616,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9.6 libtasn1-6 @@ -65640,7 +65628,7 @@

How to use this page

sles -rancher/ui-plugin-catalog:3.3.3 +rancher/ui-plugin-catalog:3.4.0 false Rancher v2.9.6 libxml2-2