chore(findings): bitnami/airflow-scheduler
Summary
bitnami/airflow-scheduler has 346 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
44cd5496dc2a5cfb2d3d5ea0949e562a | Anchore Compliance | Critical | |
07b8fda1926667beaec93b42bd7a640a | Anchore Compliance | Critical | |
CVE-2023-47038 | Anchore CVE | Medium | perl-SelectSaver-0:1.02-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-AutoLoader-0:5.74-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Getopt-Std-0:1.12-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-libs-4:5.32.1-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-base-0:2.27-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-overloading-0:0.02-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-DynaLoader-0:1.47-480.el9 |
CVE-2023-26268 | Anchore CVE | Medium | cloudant-2.15.0 |
GHSA-hrfv-mqp8-q5rw | Anchore CVE | Medium | Werkzeug-2.2.3 |
GHSA-3ww4-gg4f-jr7f | Anchore CVE | High | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-IPC-Open3-0:1.21-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Class-Struct-0:0.66-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-interpreter-4:5.32.1-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-lib-0:0.65-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Find-0:1.37-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-B-0:1.80-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-POSIX-0:1.94-480.el9 |
GHSA-6vqw-3v5j-54x4 | Anchore CVE | High | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-File-stat-0:1.09-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-NDBM_File-0:1.15-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-subs-0:1.03-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-mro-0:1.23-480.el9 |
GHSA-6vqw-3v5j-54x4 | Anchore CVE | High | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-File-Basename-0:2.85-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-IO-0:1.43-480.el9 |
GHSA-hrfv-mqp8-q5rw | Anchore CVE | Medium | Werkzeug-2.2.3 |
GHSA-3ww4-gg4f-jr7f | Anchore CVE | High | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Fcntl-0:1.13-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-vars-0:1.05-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Symbol-0:1.08-480.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-overload-0:1.31-480.el9 |
CVE-2017-1000383 | Anchore CVE | Low | emacs-filesystem-1:27.2-9.el9 |
CVE-2023-47038 | Anchore CVE | Medium | perl-FileHandle-0:2.03-480.el9 |
GHSA-9v9h-cgj8-h64p | Anchore CVE | Medium | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-if-0:0.60.800-480.el9 |
GHSA-9v9h-cgj8-h64p | Anchore CVE | Medium | cryptography-41.0.7 |
CVE-2023-47038 | Anchore CVE | Medium | perl-Errno-0:1.30-480.el9 |
CVE-2023-52448 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26583 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-33656 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-1151 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-2785 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-2162 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-4543 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-39189 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-1380 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-42756 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-3892 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26602 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6546 | Anchore CVE | High | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26584 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-24023 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-1974 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-26878 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0565 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-26558 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-1513 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-46862 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26605 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52445 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-31082 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6176 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-27672 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-3567 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6121 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6915 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-36386 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6932 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-1086 | Anchore CVE | High | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52340 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-38096 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-4387 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-34693 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-1077 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-35501 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-0171 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-28327 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-45862 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-26144 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26582 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26585 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0841 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-4135 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-28410 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-43975 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-3006 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-5090 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-7192 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-15802 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-51780 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-26146 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-3640 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-26555 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-51043 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0639 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-36558 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-37159 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-39194 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6622 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-10135 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-39193 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-31083 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26603 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-25775 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0641 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-28866 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-4459 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6531 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-45863 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-20153 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26586 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2020-26140 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-4133 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0607 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-1085 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-1972 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6040 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-1838 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0443 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26593 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-51779 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6931 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52434 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-39198 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-4969 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-37453 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-42754 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-45934 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-0480 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52439 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-20154 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-5197 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-28464 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2022-23960 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52484 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52476 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52516 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-2193 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47033 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52508 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52574 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52562 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52560 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-h574-6646-vfxx | Anchore CVE | Medium | apache-airflow-2.8.2 |
GHSA-h574-6646-vfxx | Anchore CVE | Medium | apache-airflow-2.8.2 |
CVE-2023-52580 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52570 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52565 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52582 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52578 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52477 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26581 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-cff3-5qrp-hqx7 | Anchore CVE | Medium | apache-airflow-2.8.2 |
CVE-2024-26649 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-3.11.5-1.el9_3 |
CVE-2024-2398 | Anchore CVE | Medium | curl-7.76.1-26.el9_3.3 |
CVE-2023-52626 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-27043 | Anchore CVE | Medium | python3.11-libs-3.11.5-1.el9_3 |
CVE-2023-52610 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52628 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26637 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-cff3-5qrp-hqx7 | Anchore CVE | Medium | apache-airflow-2.8.2 |
CVE-2024-26633 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52489 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-6240 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26618 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26671 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26677 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52630 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26665 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52581 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26742 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26736 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26698 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26775 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26763 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26703 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26746 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52473 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26621 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52607 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26612 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-46905 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52606 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26609 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26595 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-25742 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-cr6f-gf5w-vhrc | Anchore CVE | Medium | pymongo-4.6.2 |
GHSA-cr6f-gf5w-vhrc | Anchore CVE | Medium | pymongo-4.6.2 |
CVE-2024-25743 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-2201 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52522 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47219 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47210 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26689 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47212 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47191 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
PRISMA-2022-0168 | Twistlock CVE | High | pip-24.0 |
PRISMA-2023-0035 | Twistlock CVE | High | werkzeug-2.2.3 |
PRISMA-2023-0024 | Twistlock CVE | High | aiohttp-3.9.3 |
CVE-2024-26130 | Twistlock CVE | High | cryptography-41.0.7 |
CVE-2023-50782 | Twistlock CVE | High | cryptography-41.0.7 |
CVE-2023-46136 | Twistlock CVE | High | werkzeug-2.2.3 |
CVE-2023-36632 | Twistlock CVE | Medium | python3.11-libs-3.11.5-1.el9_3 |
CVE-2023-36632 | Twistlock CVE | Medium | python3.11-3.11.5-1.el9_3 |
CVE-2023-51767 | Twistlock CVE | Medium | openssh-clients-8.7p1-34.el9_3.3 |
CVE-2023-51767 | Twistlock CVE | Medium | openssh-8.7p1-34.el9_3.3 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-libs-5.32.1-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-FileHandle-2.03-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-POSIX-1.94-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-parent-0.238-460.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-Find-1.37-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Pod-Escapes-1.07-460.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-mro-1.23-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Errno-1.30-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-overload-1.31-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Getopt-Std-1.12-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-vars-1.05-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Class-Struct-0.66-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-base-2.27-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-interpreter-5.32.1-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-stat-1.09-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-lib-0.65-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-B-1.80-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-IO-1.43-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-NDBM_File-1.15-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-DynaLoader-1.47-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Symbol-1.08-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Fcntl-1.13-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-subs-1.03-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-if-0.60.800-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-SelectSaver-1.02-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-AutoLoader-5.74-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-Pod-Simple-3.42-4.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-File-Basename-2.85-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-overloading-0.02-480.el9 |
CVE-2023-47038 | Twistlock CVE | Medium | perl-IPC-Open3-1.21-480.el9 |
CVE-2024-0727 | Twistlock CVE | Medium | cryptography-41.0.7 |
CVE-2022-40896 | Twistlock CVE | Medium | python3.11-pip-wheel-22.3.1-4.el9_3.1 |
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-libs-3.11.5-1.el9_3 |
CVE-2023-27043 | Twistlock CVE | Medium | python3.11-3.11.5-1.el9_3 |
CVE-2023-50495 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9 |
CVE-2022-29458 | Twistlock CVE | Low | ncurses-6.2-10.20210508.el9 |
CVE-2016-20012 | Twistlock CVE | Low | openssh-8.7p1-34.el9_3.3 |
CVE-2016-20012 | Twistlock CVE | Low | openssh-clients-8.7p1-34.el9_3.3 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-m4-1.7.3-10.el9 |
CVE-2023-24056 | Twistlock CVE | Low | libpkgconf-1.7.3-10.el9 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-pkg-config-1.7.3-10.el9 |
CVE-2023-24056 | Twistlock CVE | Low | pkgconf-1.7.3-10.el9 |
CVE-2022-27943 | Twistlock CVE | Low | libstdc++-devel-11.4.1-2.1.el9 |
CVE-2017-1000383 | Twistlock CVE | Low | emacs-filesystem-27.2-9.el9 |
CVE-2024-0232 | Twistlock CVE | Low | sqlite-3.34.1-7.el9_3 |
CVE-2024-28746 | Twistlock CVE | Medium | apache-airflow-2.8.2 |
CVE-2024-2398 | Twistlock CVE | Medium | curl-7.76.1-26.el9_3.3 |
CVE-2024-29735 | Twistlock CVE | Medium | apache-airflow-2.8.2 |
CVE-2024-21506 | Twistlock CVE | Medium | pymongo-4.6.2 |
CVE-2024-3651 | Twistlock CVE | Medium | idna-3.6 |
CVE-2024-32487 | Twistlock CVE | Critical | less-590-3.el9_3 |
CVE-2024-1135 | Twistlock CVE | High | gunicorn-21.2.0 |
GHSA-2m57-hf25-phgg | Twistlock CVE | High | sqlparse-0.4.4 |
b1526bc7b766be7e18a59f3ad2497558 | Anchore Compliance | Low | |
57fa9ec087d9e84fa660415015eec945 | Anchore Compliance | Low | |
03b002811f7f1dd314d86fc2cf78088f | Anchore Compliance | Low | |
3e32638a5677814d525e6316fe623794 | Anchore Compliance | Low | |
631e611156d02a36ea30eddf4cb642ee | Anchore Compliance | Low | |
GHSA-jjg7-2v4v-x38h | Anchore CVE | Medium | idna-3.6 |
CVE-2021-47197 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47217 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47202 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-w3h3-4rj7-4ph4 | Anchore CVE | High | gunicorn-21.2.0 |
CVE-2021-47199 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-2m57-hf25-phgg | Anchore CVE | High | sqlparse-0.4.4 |
CVE-2021-47200 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47196 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47215 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26737 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47182 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-2m57-hf25-phgg | Anchore CVE | High | sqlparse-0.4.4 |
CVE-2021-47214 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-w3h3-4rj7-4ph4 | Anchore CVE | High | gunicorn-21.2.0 |
GHSA-jjg7-2v4v-x38h | Anchore CVE | Medium | idna-3.6 |
CVE-2024-26845 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26830 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26860 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52614 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26918 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26844 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26857 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26900 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26820 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52619 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
GHSA-2522-mrjc-m688 | Anchore CVE | Medium | apache-airflow-2.8.2 |
CVE-2023-52615 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-32487 | Anchore CVE | High | less-590-3.el9_3 |
CVE-2024-2961 | Anchore CVE | High | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-2961 | Anchore CVE | High | glibc-devel-2.34-83.el9_3.12 |
CVE-2024-2961 | Anchore CVE | High | glibc-langpack-en-2.34-83.el9_3.12 |
GHSA-7gpw-8wmc-pm8g | Anchore CVE | Medium | aiohttp-3.9.3 |
GHSA-2522-mrjc-m688 | Anchore CVE | Medium | apache-airflow-2.8.2 |
GHSA-7gpw-8wmc-pm8g | Anchore CVE | Medium | aiohttp-3.9.3 |
CVE-2021-47185 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-27437 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-25744 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2021-47097 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26643 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52458 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52466 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26826 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26858 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26630 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26700 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26686 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26852 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26656 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26886 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26897 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52464 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52638 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52637 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2023-52475 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-26691 | Anchore CVE | Low | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0450 | Anchore CVE | Medium | python3.11-3.11.5-1.el9_3 |
CVE-2024-26855 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-33602 | Anchore CVE | Low | glibc-langpack-en-2.34-83.el9_3.12 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-devel-2.34-83.el9_3.12 |
CVE-2024-33602 | Anchore CVE | Low | glibc-devel-2.34-83.el9_3.12 |
CVE-2024-33599 | Anchore CVE | High | glibc-langpack-en-2.34-83.el9_3.12 |
CVE-2024-33601 | Anchore CVE | Low | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-langpack-en-2.34-83.el9_3.12 |
CVE-2023-6597 | Anchore CVE | High | python3.11-3.11.5-1.el9_3 |
CVE-2024-33600 | Anchore CVE | Medium | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-26801 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-33599 | Anchore CVE | High | glibc-devel-2.34-83.el9_3.12 |
CVE-2023-6597 | Anchore CVE | High | python3.11-libs-3.11.5-1.el9_3 |
CVE-2024-33601 | Anchore CVE | Low | glibc-langpack-en-2.34-83.el9_3.12 |
CVE-2024-33601 | Anchore CVE | Low | glibc-devel-2.34-83.el9_3.12 |
CVE-2024-33602 | Anchore CVE | Low | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-26735 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-0450 | Anchore CVE | Medium | python3.11-libs-3.11.5-1.el9_3 |
CVE-2024-26804 | Anchore CVE | Medium | kernel-headers-5.14.0-362.24.1.el9_3 |
CVE-2024-33599 | Anchore CVE | High | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-headers-2.34-83.el9_3.12 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-langpack-en-2.34-83.el9_3.12 |
CVE-2024-2961 | Twistlock CVE | Critical | glibc-devel-2.34-83.el9_3.12 |
VAT: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-scheduler&tag=2.8.2&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-scheduler&tag=2.7.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the StatusVerification label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.