You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What steps did you take and what happened:
Ran banzai cli scan of velero which has 6 "high" vulnerabilities.
| CVE-2023-0286 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.17 | High | There is a type confusion vulnerability relating to X.400 ad |
| CVE-2022-0778 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.12 | High | The BN_mod_sqrt() function, which computes a modular square |
| CVE-2021-3711 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.8 | High | In order to decrypt SM2 encrypted data an application is exp |
| CVE-2021-33910 | libsystemd0 | 245.4-4ubuntu3.2 | 245.4-4ubuntu3.10 | High | basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, |
| CVE-2021-3449 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.3 | High | An OpenSSL TLS server may crash if sent a maliciously crafte |
| CVE-2020-1971 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.1 | High | The X.509 GeneralName type is a generic type for representin |
What did you expect to happen:
No High vulnerabilities
The output of the following commands will help us better understand what's going on:
(Pasting long output into a GitHub gist or other pastebin is fine.)
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Air gapped installation requires zero High vulerabilites
Environment:
helm version (use helm version): v3.13.1
helm chart version and app version (use helm list -n <YOUR NAMESPACE>):
Kubernetes version (use kubectl version): 1.28.4
Kubernetes installer & version:
Cloud provider or hardware configuration: n/a
OS (e.g. from /etc/os-release): VERSION="20.04.6 LTS (Focal Fossa)"
The text was updated successfully, but these errors were encountered:
What steps did you take and what happened:
Ran banzai cli scan of velero which has 6 "high" vulnerabilities.
| CVE-2023-0286 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.17 | High | There is a type confusion vulnerability relating to X.400 ad |
| CVE-2022-0778 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.12 | High | The BN_mod_sqrt() function, which computes a modular square |
| CVE-2021-3711 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.8 | High | In order to decrypt SM2 encrypted data an application is exp |
| CVE-2021-33910 | libsystemd0 | 245.4-4ubuntu3.2 | 245.4-4ubuntu3.10 | High | basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, |
| CVE-2021-3449 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.3 | High | An OpenSSL TLS server may crash if sent a maliciously crafte |
| CVE-2020-1971 | libssl1.1 | 1.1.1f-1ubuntu2 | 1.1.1f-1ubuntu2.1 | High | The X.509 GeneralName type is a generic type for representin |
What did you expect to happen:
No High vulnerabilities
The output of the following commands will help us better understand what's going on:
(Pasting long output into a GitHub gist or other pastebin is fine.)
Anything else you would like to add:
[Miscellaneous information that will assist in solving the issue.]
Air gapped installation requires zero High vulerabilites
Environment:
helm version
): v3.13.1helm list -n <YOUR NAMESPACE>
):kubectl version
): 1.28.4/etc/os-release
): VERSION="20.04.6 LTS (Focal Fossa)"The text was updated successfully, but these errors were encountered: