airflow-scheduler issues
https://repo1.dso.mil/dsop/bitnami/airflow-scheduler/-/issues
2024-03-28T02:15:07Z
https://repo1.dso.mil/dsop/bitnami/airflow-scheduler/-/issues/60
chore(findings): bitnami/airflow-scheduler
2024-03-28T02:15:07Z
robotnik
chore(findings): bitnami/airflow-scheduler
## Summary
bitnami/airflow-scheduler has 229 new findings discovered during continuous monitoring.
id | source | severity | package
-- | ------ | -------- | -------
44cd5496dc2a5cfb2d3d5ea0949e562a | Anchore Compliance | Critical |
07...
## Summary
bitnami/airflow-scheduler has 229 new findings discovered during continuous monitoring.
id | source | severity | package
-- | ------ | -------- | -------
44cd5496dc2a5cfb2d3d5ea0949e562a | Anchore Compliance | Critical |
07b8fda1926667beaec93b42bd7a640a | Anchore Compliance | Critical |
CVE-2023-47038 | Anchore CVE | Medium | perl-SelectSaver-0:1.02-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-AutoLoader-0:5.74-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-Getopt-Std-0:1.12-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-libs-4:5.32.1-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-base-0:2.27-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-overloading-0:0.02-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-DynaLoader-0:1.47-480.el9
CVE-2023-26268 | Anchore CVE | Medium | cloudant-2.15.0
GHSA-hrfv-mqp8-q5rw | Anchore CVE | Medium | Werkzeug-2.2.3
GHSA-3ww4-gg4f-jr7f | Anchore CVE | High | cryptography-41.0.7
CVE-2023-47038 | Anchore CVE | Medium | perl-IPC-Open3-0:1.21-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-Class-Struct-0:0.66-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-interpreter-4:5.32.1-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-lib-0:0.65-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Find-0:1.37-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-B-0:1.80-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-POSIX-0:1.94-480.el9
GHSA-6vqw-3v5j-54x4 | Anchore CVE | High | cryptography-41.0.7
CVE-2023-4039 | Anchore CVE | Medium | libstdc++-devel-11.4.1-2.1.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-File-stat-0:1.09-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-NDBM_File-0:1.15-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-subs-0:1.03-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-mro-0:1.23-480.el9
GHSA-6vqw-3v5j-54x4 | Anchore CVE | High | cryptography-41.0.7
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Basename-0:2.85-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-IO-0:1.43-480.el9
GHSA-hrfv-mqp8-q5rw | Anchore CVE | Medium | Werkzeug-2.2.3
GHSA-3ww4-gg4f-jr7f | Anchore CVE | High | cryptography-41.0.7
CVE-2023-47038 | Anchore CVE | Medium | perl-Fcntl-0:1.13-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-vars-0:1.05-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-Symbol-0:1.08-480.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-overload-0:1.31-480.el9
CVE-2017-1000383 | Anchore CVE | Low | emacs-filesystem-1:27.2-9.el9
CVE-2023-47038 | Anchore CVE | Medium | perl-FileHandle-0:2.03-480.el9
CVE-2022-48624 | Anchore CVE | Medium | less-590-2.el9_2
GHSA-9v9h-cgj8-h64p | Anchore CVE | Medium | cryptography-41.0.7
CVE-2023-47038 | Anchore CVE | Medium | perl-if-0:0.60.800-480.el9
GHSA-9v9h-cgj8-h64p | Anchore CVE | Medium | cryptography-41.0.7
CVE-2023-47038 | Anchore CVE | Medium | perl-Errno-0:1.30-480.el9
CVE-2023-52448 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26583 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-33656 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-31085 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-1151 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-2785 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-2162 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-2248 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-4543 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-39189 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-1380 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6240 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-42756 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-3892 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-2019 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26602 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6546 | Anchore CVE | High | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26584 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-24023 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-1974 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-26878 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0565 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-26558 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-1513 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4010 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-46862 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26605 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52445 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-31082 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6176 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-27672 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-3567 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6121 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6915 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-36386 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6932 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-1086 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52340 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-38096 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52435 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4387 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-34693 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-1077 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-35501 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-0171 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-28327 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-45862 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-2483 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-26144 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26582 | Anchore CVE | High | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26585 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0841 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-4135 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-28410 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-43975 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0564 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-3006 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-5090 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-7192 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-15802 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-51780 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-26146 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-3640 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-26555 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-51043 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0639 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-36558 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-37159 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-39194 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6622 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-10135 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-39193 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-31083 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26603 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-25775 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0641 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-28866 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4459 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-2156 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6531 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-45863 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-20153 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26586 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2020-26140 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4133 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0607 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-1085 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-1972 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6040 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-1838 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-0443 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26593 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-51779 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-6931 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52434 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-39198 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4563 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-4969 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-37453 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-42754 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-45934 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-0480 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52439 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-20154 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-5197 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-28464 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2022-23960 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52484 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52476 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52516 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-2193 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2021-47033 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52508 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52587 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52574 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52562 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52560 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52559 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
GHSA-h574-6646-vfxx | Anchore CVE | Medium | apache-airflow-2.8.2
GHSA-h574-6646-vfxx | Anchore CVE | Medium | apache-airflow-2.8.2
CVE-2023-52580 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52570 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52565 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52582 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26618 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52578 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52489 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2023-52477 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3
CVE-2024-26581 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3
PRISMA-2022-0168 | Twistlock CVE | High | pip-24.0
PRISMA-2023-0035 | Twistlock CVE | High | werkzeug-2.2.3
PRISMA-2023-0024 | Twistlock CVE | High | aiohttp-3.9.3
CVE-2024-26130 | Twistlock CVE | High | cryptography-41.0.7
CVE-2023-50782 | Twistlock CVE | High | cryptography-41.0.7
CVE-2023-46136 | Twistlock CVE | High | werkzeug-2.2.3
CVE-2023-36632 | Twistlock CVE | Medium | python3.11-libs-3.11.5-1.el9_3
CVE-2023-36632 | Twistlock CVE | Medium | python3.11-3.11.5-1.el9_3
CVE-2023-51767 | Twistlock CVE | Medium | openssh-clients-8.7p1-34.el9_3.3
CVE-2023-51767 | Twistlock CVE | Medium | openssh-8.7p1-34.el9_3.3
CVE-2023-47038 | Twistlock CVE | Medium | perl-libs-5.32.1-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-FileHandle-2.03-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-POSIX-1.94-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-parent-0.238-460.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-Find-1.37-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Pod-Escapes-1.07-460.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-mro-1.23-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Errno-1.30-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-overload-1.31-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Getopt-Std-1.12-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-vars-1.05-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Class-Struct-0.66-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-base-2.27-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-interpreter-5.32.1-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-stat-1.09-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-lib-0.65-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-B-1.80-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-IO-1.43-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-NDBM_File-1.15-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-DynaLoader-1.47-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Symbol-1.08-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Fcntl-1.13-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-subs-1.03-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-if-0.60.800-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-SelectSaver-1.02-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-AutoLoader-5.74-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-Pod-Simple-3.42-4.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-Basename-2.85-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-overloading-0.02-480.el9
CVE-2023-47038 | Twistlock CVE | Medium | perl-IPC-Open3-1.21-480.el9
CVE-2022-48624 | Twistlock CVE | Medium | less-590-2.el9_2
CVE-2024-0727 | Twistlock CVE | Medium | cryptography-41.0.7
CVE-2022-40896 | Twistlock CVE | Medium | python3.11-pip-wheel-22.3.1-4.el9_3.1
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-libs-3.11.5-1.el9_3
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-3.11.5-1.el9_3
CVE-2023-50495 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9
CVE-2022-29458 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9
CVE-2016-20012 | Twistlock CVE | Low | openssh-8.7p1-34.el9_3.3
CVE-2016-20012 | Twistlock CVE | Low | openssh-clients-8.7p1-34.el9_3.3
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-m4-1.7.3-10.el9
CVE-2023-24056 | Twistlock CVE | Low | libpkgconf-1.7.3-10.el9
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-pkg-config-1.7.3-10.el9
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-1.7.3-10.el9
CVE-2022-27943 | Twistlock CVE | Low | libstdc++-devel-11.4.1-2.1.el9
CVE-2017-1000383 | Twistlock CVE | Low | emacs-filesystem-27.2-9.el9
CVE-2024-0232 | Twistlock CVE | Low | sqlite-3.34.1-7.el9_3
CVE-2024-28746 | Twistlock CVE | Medium | apache-airflow-2.8.2
CVE-2024-2398 | Twistlock CVE | Medium | curl-7.76.1-26.el9_3.3
CVE-2024-29735 | Twistlock CVE | Medium | apache-airflow-2.8.2
VAT: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-scheduler&tag=2.8.2&branch=master<br>More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-scheduler&tag=2.7.1&branch=master
## Tasks
Contributor:
- [ ] Provide justifications for findings in the [VAT](https://vat.dso.mil) ([docs](https://docs-ironbank.dso.mil/hardening/justifications/))
- [ ] Apply the ~"Status::Verification" label to this issue and wait for feedback
Iron Bank:
- [ ] Review findings and justifications
> Note: If the above process is rejected for any reason, the `Verification` label will be removed and the issue will be sent back to `Open`. Any comments will be listed in this issue for you to address. Once they have been addressed, you **must** re-add the `Verification` label.
## Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add `/cc @ironbank-notifications/onboarding`.
Additionally, Iron Bank hosts an [AMA](https://www.zoomgov.com/meeting/register/vJIsdemoqTMpGpm-2c6xjdAm0MLD6vuvu5I) working session every Wednesday from 1630-1730EST to answer questions.
joram.stephenson
Kyle Rilling
Achsah Abraham
David Freeman
joram.stephenson