You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using the latest v1.45.0 OPM image available and our twistlock & aqua scanners are flagging the image for these critical & high vulnerabilities.
cve sev epss package type version fixedIn arch path CVE-2024-41110 | critical (aqua) | 0.045% | github.com/docker/docker | go (aqua) | 26.1.3+incompatible (aqua) | 27.1.1 (aqua) | amd64 | /bin/opm (aqua) CVE-2023-24538 critical (twistlock) 0.554% html/template go (twistlock) 1.17.9 (twistlock) 1.20.3 (twistlock) amd64 /bin/grpc_health_probe (twistlock) CVE-2023-24540 critical (twistlock) 0.256% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock) CVE-2023-24539 high (twistlock) 0.139% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock) CVE-2023-29400 high (twistlock) 0.139% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock)
cve sev epss package type version fixedIn arch path CVE-2024-41110 critical (aqua) 0.045% github.com/docker/docker go (aqua) 26.1.3+incompatible (aqua) 27.1.1 (aqua) amd64 /bin/opm (aqua)
Would it be possible to remediate these critical CVEs atleast?
The text was updated successfully, but these errors were encountered:
We are using the latest
v1.45.0
OPM image available and our twistlock & aqua scanners are flagging the image for these critical & high vulnerabilities.cve sev epss package type version fixedIn arch path
CVE-2024-41110 | critical (aqua) | 0.045% | github.com/docker/docker | go (aqua) | 26.1.3+incompatible (aqua) | 27.1.1 (aqua) | amd64 | /bin/opm (aqua)
CVE-2023-24538 critical (twistlock) 0.554% html/template go (twistlock) 1.17.9 (twistlock) 1.20.3 (twistlock) amd64 /bin/grpc_health_probe (twistlock)
CVE-2023-24540 critical (twistlock) 0.256% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock)
CVE-2023-24539 high (twistlock) 0.139% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock)
CVE-2023-29400 high (twistlock) 0.139% html/template go (twistlock) 1.17.9 (twistlock) 1.20.4 (twistlock) amd64 /bin/grpc_health_probe (twistlock)
cve sev epss package type version fixedIn arch path
CVE-2024-41110 critical (aqua) 0.045% github.com/docker/docker go (aqua) 26.1.3+incompatible (aqua) 27.1.1 (aqua) amd64 /bin/opm (aqua)
Would it be possible to remediate these critical CVEs atleast?
The text was updated successfully, but these errors were encountered: