SUSE Rancher - RKE2 v1.32.7 version - CVE Scans - 2025-08-21

How to use this page

Search:

Image Mirrored Release Binary/Package Dependency Vulnerability ID (CVE) Severity Status Justification (for status not affected) Type (language or OS)
rancher/hardened-addon-resizer:1.8.23-build20250612 false RKE2 v1.32.7 pod_nanny stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 calicoctl stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/bandwidth stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/bond stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/bridge stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/calico stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/calico-ipam stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/dhcp stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/dummy stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/firewall stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/flannel stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/host-device stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/host-local stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/install stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/ipvlan stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/loopback stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/macvlan stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/portmap stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/ptp stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/sbr stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/static stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/tap stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/tuning stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/vlan stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 opt/cni/bin/vrf stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 usr/bin/calico-node stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 usr/bin/check-status stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 usr/bin/kube-controllers stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 usr/local/bin/flexvol/flexvoldriver stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 false RKE2 v1.32.7 cluster-proportional-autoscaler stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-coredns:v1.12.2-build20250611 false RKE2 v1.32.7 coredns stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-dns-node-cache:1.26.0-build20250611 false RKE2 v1.32.7 node-cache stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-etcd:v3.5.21-k3s1-build20250612 false RKE2 v1.32.7 usr/local/bin/etcd stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-etcd:v3.5.21-k3s1-build20250612 false RKE2 v1.32.7 usr/local/bin/etcdctl stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 opt/bin/flanneld stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-k8s-metrics-server:v0.8.0-build20250704 false RKE2 v1.32.7 metrics-server stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-proxy stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-scheduler stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubectl stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.8-build20250709 false RKE2 v1.32.7 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis stdlib@v1.24.5 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.8-build20250709 false RKE2 v1.32.7 home/klipper-helm/.local/share/helm/plugins/helm-set-status/helm-set-status stdlib@v1.24.5 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/klipper-helm:v0.9.8-build20250709 false RKE2 v1.32.7 usr/bin/helm stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-ingress-nginx-kube-webhook-certgen:v1.6.0 true RKE2 v1.32.7 kube-webhook-certgen stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.32.7 snapshot-controller stdlib@v1.23.1 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 dbg stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 nginx-ingress-controller stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 wait-shutdown stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-cloud-provider:v1.32.5-rc1.0.20250516182639-8e8f2a4726fd-build20250612 false RKE2 v1.32.7 usr/local/bin/rke2-cloud-provider stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/containerd stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/containerd-shim-runc-v2 stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/crictl stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/ctr stdlib@v1.24.4 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubectl stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/runc stdlib@v1.23.10 CVE-2025-47907
MEDIUM*Severity modified based on SUSE's CVE database and CVSS rating
affected gobinary
rancher/hardened-addon-resizer:1.8.23-build20250612 false RKE2 v1.32.7 pod_nanny golang.org/x/net@v0.33.0 CVE-2025-22870 none not affected vulnerable code not present gobinary
rancher/hardened-addon-resizer:1.8.23-build20250612 false RKE2 v1.32.7 pod_nanny golang.org/x/net@v0.33.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/hardened-addon-resizer:1.8.23-build20250612 false RKE2 v1.32.7 pod_nanny golang.org/x/oauth2@v0.24.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 boost-license1_66_0 boost-license1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 libboost_system1_66_0 libboost_system1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 libboost_thread1_66_0 libboost_thread1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 libsqlite3-0 libsqlite3-0@3.49.1-150000.3.27.1 SUSE-SU-2025:02672-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-calico:v3.30.2-build20250711 false RKE2 v1.32.7 libxml2-2 libxml2-2@2.12.10-150700.4.3.1 SUSE-SU-2025:02617-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 false RKE2 v1.32.7 cluster-proportional-autoscaler golang.org/x/net@v0.36.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/hardened-cluster-autoscaler:v1.10.2-build20250611 false RKE2 v1.32.7 cluster-proportional-autoscaler golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 boost-license1_66_0 boost-license1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 libboost_system1_66_0 libboost_system1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 libboost_thread1_66_0 libboost_thread1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 libgnutls30 libgnutls30@3.8.3-150600.4.6.2 SUSE-SU-2025:02595-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 libsqlite3-0 libsqlite3-0@3.49.1-150000.3.27.1 SUSE-SU-2025:02672-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 libxml2-2 libxml2-2@2.12.10-150700.4.3.1 SUSE-SU-2025:02617-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-flannel:v0.27.1-build20250710 false RKE2 v1.32.7 opt/bin/flanneld golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 boost-license1_66_0 boost-license1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 libboost_system1_66_0 libboost_system1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 libboost_thread1_66_0 libboost_thread1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 libsqlite3-0 libsqlite3-0@3.49.1-150000.3.27.1 SUSE-SU-2025:02672-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 libxml2-2 libxml2-2@2.10.3-150500.5.29.1 SUSE-SU-2025:02758-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-apiserver gopkg.in/square/go-jose.v2@v2.6.0 CVE-2024-28180 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-controller-manager gopkg.in/square/go-jose.v2@v2.6.0 CVE-2024-28180 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-proxy golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-proxy golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-proxy golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-proxy golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-scheduler golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-scheduler golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-scheduler golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kube-scheduler golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubectl golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubectl golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 CVE-2023-45142 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/hardened-kubernetes:v1.32.7-rke2r1-build20250716 false RKE2 v1.32.7 usr/local/bin/kubelet golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/klipper-helm:v0.9.8-build20250709 false RKE2 v1.32.7 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis helm.sh/helm/v3@v3.18.4 CVE-2025-55198 none not affected vulnerable code not in execute path gobinary
rancher/klipper-helm:v0.9.8-build20250709 false RKE2 v1.32.7 home/klipper-helm/.local/share/helm/plugins/helm-mapkubeapis/bin/mapkubeapis helm.sh/helm/v3@v3.18.4 CVE-2025-55199 none not affected vulnerable code not in execute path gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.32.7 snapshot-controller golang.org/x/net@v0.31.0 CVE-2025-22870 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.32.7 snapshot-controller golang.org/x/net@v0.31.0 CVE-2025-22872 none not affected vulnerable code not present gobinary
rancher/mirrored-sig-storage-snapshot-controller:v8.2.0 true RKE2 v1.32.7 snapshot-controller golang.org/x/oauth2@v0.24.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 boost-license1_66_0 boost-license1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 libboost_system1_66_0 libboost_system1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 libboost_thread1_66_0 libboost_thread1_66_0@1.66.0-12.3.1 SUSE-SU-2025:02536-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 libsqlite3-0 libsqlite3-0@3.49.1-150000.3.27.1 SUSE-SU-2025:02672-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 libxml2-2 libxml2-2@2.10.3-150500.5.29.1 SUSE-SU-2025:02758-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/nginx-ingress-controller:v1.12.4-hardened2 false RKE2 v1.32.7 libxml2-tools libxml2-tools@2.10.3-150500.5.29.1 SUSE-SU-2025:02758-1 none not affected vulnerable code cannot be controlled by adversary sles
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/crictl golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/crictl golang.org/x/net@v0.30.0 CVE-2025-22872 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/crictl golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubectl golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubectl golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful@v0.42.0 CVE-2023-45142 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet golang.org/x/crypto@v0.28.0 CVE-2024-45337 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet golang.org/x/crypto@v0.28.0 CVE-2025-22869 none not affected vulnerable code not present gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet golang.org/x/net@v0.30.0 CVE-2025-22870 none not affected vulnerable code not in execute path gobinary
rancher/rke2-runtime:v1.32.7-rke2r1 false RKE2 v1.32.7 bin/kubelet golang.org/x/oauth2@v0.23.0 CVE-2025-22868 none not affected vulnerable code not present gobinary