chore(findings): bitnami/airflow
Summary
bitnami/airflow has 497 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
7e0c1b561b484fb48ffc3efaa8fbacc9 | Anchore Compliance | Critical | |
bcdfef54201eef1f1f8d0d9514f68671 | Anchore Compliance | Critical | |
44157b615175e1e70f57f7ad0d9550ef | Anchore Compliance | Critical | |
c88e51965fd198ed35bc9171851a5e9d | Anchore Compliance | Critical | |
dda9424266cd2035ddff92fe347ce9fb | Anchore Compliance | Critical | |
b25d36fae9f6e031f5392a49e3edc394 | Anchore Compliance | Critical | |
70731ac0375b16d60f6858adcf1ecaea | Anchore Compliance | Critical | |
304d8669245d75ba99c07c4de46a98fd | Anchore Compliance | Critical | |
604a646046ef89bf63a49a0acb4023ce | Anchore Compliance | Critical | |
a9888545398921bdea9108003038dcf4 | Anchore Compliance | Critical | |
1cb46b2d796f7b3f96c175e2ea575441 | Anchore Compliance | Critical | |
23450b679695008adde7285416685d82 | Anchore Compliance | Critical | |
5be6e77774285992d4adcf96f00351c1 | Anchore Compliance | Critical | |
66e961acf7c6033526b0d89d4a0a4b7d | Anchore Compliance | Critical | |
b18c88ddeab24abfb92ae2ccddb0b022 | Anchore Compliance | Critical | |
GHSA-xg9f-g7g7-2323 | Anchore CVE | High | Werkzeug-2.2.2 |
GHSA-w7pp-m8wf-vj6r | Anchore CVE | Medium | cryptography-38.0.4 |
GHSA-29gw-9793-fvw7 | Anchore CVE | Medium | ipython-8.8.0 |
GHSA-x4qr-2fvf-3mr5 | Anchore CVE | High | cryptography-38.0.4 |
GHSA-jrwr-5x3p-hvc3 | Anchore CVE | Medium | markdown-it-py-2.1.0 |
CVE-2022-41862 | Anchore CVE | Low | libpq-13.5-1.el9 |
GHSA-6c9x-mj3g-h47x | Anchore CVE | Medium | swagger-ui-dist-3.52.0 |
GHSA-px8h-6qxv-m22q | Anchore CVE | Low | Werkzeug-2.2.2 |
GHSA-f3fp-gc8g-vw66 | Anchore CVE | Medium | github.com/opencontainers/runc-v1.1.0 |
GHSA-qrmm-w75w-3wpx | Anchore CVE | Medium | swagger-ui-dist-3.52.0 |
GHSA-vrjv-mxr7-vjf8 | Anchore CVE | Medium | markdown-it-py-2.1.0 |
GHSA-w596-4wvx-j9j6 | Anchore CVE | High | py-1.11.0 |
GHSA-vpvm-3wq2-2wvm | Anchore CVE | High | github.com/opencontainers/runc-v1.1.0 |
CVE-2023-0286 | Anchore CVE | High | compat-openssl11-1:1.1.1k-4.el9_0 |
GHSA-h6g5-wqqr-3mw3 | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-g2j6-57v7-gm8c | Anchore CVE | Medium | github.com/opencontainers/runc-v1.1.0 |
GHSA-m8cg-xc2p-r3fc | Anchore CVE | Low | github.com/opencontainers/runc-v1.1.0 |
GHSA-9hcr-9hcv-x6pv | Anchore CVE | High | Flask-AppBuilder-4.1.4 |
CVE-2022-48468 | Anchore CVE | Medium | protobuf-c-1.3.3-12.el9 |
GHSA-rrm6-wvj7-cwh2 | Anchore CVE | Medium | sqlparse-0.4.3 |
CVE-2023-29491 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
GHSA-m2qf-hxjv-5gpq | Anchore CVE | High | Flask-2.2.2 |
GHSA-vcf6-3wv2-5vcr | Anchore CVE | Medium | apache-airflow-2.5.1 |
CVE-2017-1000383 | Anchore CVE | Low | emacs-filesystem-1:27.2-8.el9_2.1 |
GHSA-jchm-fm4q-c2fp | Anchore CVE | Critical | apache-airflow-2.5.1 |
CVE-2023-26268 | Anchore CVE | Medium | cloudant-2.15.0 |
GHSA-j8r2-6x86-q33q | Anchore CVE | Medium | requests-2.28.2 |
GHSA-hj3f-6gcp-jg8j | Anchore CVE | Medium | tornado-6.1 |
CVE-2023-2953 | Anchore CVE | Low | openldap-compat-2.6.2-3.el9 |
CVE-2023-2953 | Anchore CVE | Low | openldap-2.6.2-3.el9 |
GHSA-5cpq-8wj7-hf2v | Anchore CVE | Low | cryptography-38.0.4 |
CVE-2023-32611 | Anchore CVE | Low | glib2-2.68.4-6.el9 |
CVE-2023-32636 | Anchore CVE | Low | glib2-2.68.4-6.el9 |
CVE-2023-29499 | Anchore CVE | Low | glib2-2.68.4-6.el9 |
CVE-2023-32665 | Anchore CVE | Low | glib2-2.68.4-6.el9 |
GHSA-mjff-wv85-hmcj | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-jhpr-j7cq-3jp3 | Anchore CVE | Low | Flask-AppBuilder-4.1.4 |
CVE-2023-31484 | Anchore CVE | Medium | perl-IPC-Open3-0:1.21-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-if-0:0.60.800-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-interpreter-4:5.32.1-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-overload-0:1.31-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-NDBM_File-0:1.15-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-DynaLoader-0:1.47-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-File-Find-0:1.37-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-Errno-0:1.30-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-Getopt-Std-0:1.12-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-AutoLoader-0:5.74-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-Class-Struct-0:0.66-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-mro-0:1.23-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-lib-0:0.65-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-vars-0:1.05-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-IO-0:1.43-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-FileHandle-0:2.03-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-overloading-0:0.02-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-POSIX-0:1.94-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-subs-0:1.03-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-B-0:1.80-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-File-stat-0:1.09-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-base-0:2.27-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-Fcntl-0:1.13-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-Symbol-0:1.08-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-libs-4:5.32.1-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-File-Basename-0:2.85-480.el9 |
CVE-2023-31484 | Anchore CVE | Medium | perl-SelectSaver-0:1.02-480.el9 |
GHSA-9hxf-ppjv-w6rq | Anchore CVE | Medium | grpcio-1.51.1 |
GHSA-cfgp-2977-2fmm | Anchore CVE | High | grpcio-1.51.1 |
GHSA-6628-q6j9-w8vg | Anchore CVE | High | grpcio-1.51.1 |
GHSA-ggwr-4vr8-g7wv | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-3h4m-m55v-gx4m | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-2h84-3crq-vgfj | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-xvw9-3mhm-xjqq | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-mrwq-x4v8-fh7p | Anchore CVE | Medium | Pygments-2.14.0 |
GHSA-45c4-8wx5-qw6w | Anchore CVE | Medium | aiohttp-3.8.3 |
GHSA-5946-8p38-vffp | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-xqr8-7jwr-rhp7 | Anchore CVE | High | certifi-2022.12.7 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-pam-252-14.el9_2.3 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-rpm-macros-252-14.el9_2.3 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-libs-252-14.el9_2.3 |
CVE-2021-3997 | Anchore CVE | Medium | systemd-252-14.el9_2.3 |
GHSA-jm77-qphf-c4w8 | Anchore CVE | Low | cryptography-38.0.4 |
GHSA-269x-pg5c-5xgm | Anchore CVE | High | apache-airflow-2.5.1 |
GHSA-pr76-5cm5-w9cj | Anchore CVE | Critical | GitPython-3.1.30 |
GHSA-qppv-j76h-2rpx | Anchore CVE | Medium | tornado-6.1 |
CVE-2023-2975 | Anchore CVE | Low | openssl-libs-1:3.0.7-17.el9_2 |
CVE-2023-3446 | Anchore CVE | Low | openssl-libs-1:3.0.7-17.el9_2 |
CVE-2023-3817 | Anchore CVE | Low | openssl-1:3.0.7-17.el9_2 |
CVE-2023-3446 | Anchore CVE | Low | openssl-1:3.0.7-17.el9_2 |
CVE-2021-44568 | Anchore CVE | Low | libsolv-0.7.22-4.el9 |
CVE-2021-32256 | Anchore CVE | Medium | gdb-gdbserver-10.2-10.el9 |
CVE-2021-23840 | Anchore CVE | Medium | openssl-1:3.0.7-17.el9_2 |
CVE-2021-23840 | Anchore CVE | Medium | openssl-libs-1:3.0.7-17.el9_2 |
CVE-2023-31486 | Anchore CVE | Medium | perl-HTTP-Tiny-0.076-460.el9 |
CVE-2023-3817 | Anchore CVE | Low | openssl-libs-1:3.0.7-17.el9_2 |
CVE-2023-4016 | Anchore CVE | Low | procps-ng-3.3.17-11.el9 |
CVE-2023-2975 | Anchore CVE | Low | openssl-1:3.0.7-17.el9_2 |
CVE-2022-47673 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-47695 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2020-19726 | Anchore CVE | Medium | gdb-gdbserver-10.2-10.el9 |
CVE-2022-48063 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2020-19724 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-47007 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-47696 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-48064 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2023-39975 | Anchore CVE | Medium | krb5-libs-1.20.1-9.el9_2 |
CVE-2020-35342 | Anchore CVE | Medium | gdb-gdbserver-10.2-10.el9 |
CVE-2022-48065 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
GHSA-pm87-24wq-r8w9 | Anchore CVE | High | apache-airflow-2.5.1 |
CVE-2022-35206 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-47011 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2022-45703 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
GHSA-5f35-pq34-c87q | Anchore CVE | Medium | apache-airflow-2.5.1 |
GHSA-x2mh-8fmc-rqgh | Anchore CVE | High | apache-airflow-2.5.1 |
CVE-2023-36054 | Anchore CVE | Medium | krb5-libs-1.20.1-9.el9_2 |
CVE-2022-47010 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2021-46174 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2020-21490 | Anchore CVE | Low | gdb-gdbserver-10.2-10.el9 |
CVE-2020-19185 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19186 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19189 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19187 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19186 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2020-22916 | Anchore CVE | Low | xz-devel-5.2.5-8.el9_0 |
CVE-2020-19186 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19189 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2020-19185 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19188 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19190 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2020-19189 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19187 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19188 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19185 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2020-19187 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2020-22916 | Anchore CVE | Low | xz-libs-5.2.5-8.el9_0 |
CVE-2020-19190 | Anchore CVE | Medium | ncurses-6.2-8.20210508.el9 |
CVE-2020-19190 | Anchore CVE | Medium | ncurses-base-6.2-8.20210508.el9 |
CVE-2020-19188 | Anchore CVE | Medium | ncurses-libs-6.2-8.20210508.el9 |
CVE-2023-30078 | Anchore CVE | High | libeconf-0.4.1-3.el9_2 |
CVE-2022-48554 | Anchore CVE | Low | file-libs-5.39-12.1.el9_2 |
CVE-2023-39615 | Anchore CVE | Medium | libxml2-2.9.13-3.el9_2.1 |
GHSA-wfm5-v35h-vwf4 | Anchore CVE | High | GitPython-3.1.30 |
GHSA-cwvm-v4w8-q58c | Anchore CVE | Medium | GitPython-3.1.30 |
CVE-2023-4641 | Anchore CVE | Low | shadow-utils-2:4.9-6.el9 |
CVE-2023-23908 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2166 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-47938 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1247 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2269 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3358 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1513 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-0171 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-28327 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-33951 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3609 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-27418 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-28866 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-26878 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4133 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1252 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4128 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-31436 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-3543 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-40133 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3567 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2236 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
GHSA-mjqh-v5f2-g2mw | Anchore CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-3022 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4563 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-36123 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4622 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-41858 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nspr-4.35.0-3.el9_2 |
CVE-2023-37453 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-4090 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nss-softokn-freebl-3.90.0-3.el9_2 |
CVE-2023-1077 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1855 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4015 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-35501 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-38409 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-2785 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-33656 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-26545 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-40982 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3006 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-20583 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-43975 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-35825 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-28410 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-33952 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-30456 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nss-3.90.0-3.el9_2 |
CVE-2021-3864 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-20153 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-36402 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-3565 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4194 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-23960 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3812 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-41715 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-2880 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-2879 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-41716 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-41717 | Twistlock CVE | Medium | go-1.18.2 |
GHSA-qrmm-w75w-3wpx | Twistlock CVE | Medium | swagger-ui-dist-3.52.0 |
CVE-2021-46708 | Twistlock CVE | Medium | swagger-ui-dist-3.52.0 |
CVE-2022-41725 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-41724 | Twistlock CVE | High | go-1.18.2 |
CVE-2022-41723 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.18.2 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-24532 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-25696 | Twistlock CVE | Critical | apache-airflow-providers-apache-hive-5.1.1 |
CVE-2023-25691 | Twistlock CVE | Critical | apache-airflow-providers-google-8.8.0 |
PRISMA-2023-0024 | Twistlock CVE | High | aiohttp-3.8.3 |
CVE-2023-25577 | Twistlock CVE | High | werkzeug-2.2.2 |
CVE-2022-42969 | Twistlock CVE | High | py-1.11.0 |
CVE-2023-29005 | Twistlock CVE | High | flask-appbuilder-4.1.4 |
CVE-2023-28706 | Twistlock CVE | Critical | apache-airflow-providers-apache-hive-5.1.1 |
CVE-2023-25956 | Twistlock CVE | High | apache-airflow-providers-amazon-7.1.0 |
CVE-2023-25692 | Twistlock CVE | High | apache-airflow-providers-google-8.8.0 |
CVE-2023-24816 | Twistlock CVE | High | ipython-8.8.0 |
CVE-2023-0286 | Twistlock CVE | High | cryptography-38.0.4 |
CVE-2022-1941 | Twistlock CVE | High | protobuf-3.20.0 |
CVE-2023-23931 | Twistlock CVE | Medium | cryptography-38.0.4 |
CVE-2023-25695 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-28707 | Twistlock CVE | High | apache-airflow-providers-apache-drill-2.3.1 |
CVE-2023-26303 | Twistlock CVE | Medium | markdown-it-py-2.1.0 |
CVE-2023-26302 | Twistlock CVE | Medium | markdown-it-py-2.1.0 |
CVE-2023-23934 | Twistlock CVE | Low | werkzeug-2.2.2 |
CVE-2023-24537 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-24537 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24537 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-24538 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-24536 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-24536 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24536 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24534 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24534 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24534 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-21971 | Twistlock CVE | Medium | mysql-connector-python-8.0.32 |
CVE-2023-30861 | Twistlock CVE | High | flask-2.2.2 |
CVE-2023-29247 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-25754 | Twistlock CVE | Critical | apache-airflow-2.5.1 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-24540 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-29400 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-29400 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-29400 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-24539 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24539 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-24539 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-32681 | Twistlock CVE | Medium | requests-2.28.2 |
CVE-2023-28370 | Twistlock CVE | Medium | tornado-6.1 |
GHSA-5cpq-8wj7-hf2v | Twistlock CVE | Low | cryptography-38.0.4 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29405 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29404 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29402 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-29403 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-29403 | Twistlock CVE | High | go-1.19.6 |
CVE-2023-29403 | Twistlock CVE | High | go-1.18.2 |
CVE-2023-35005 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-34110 | Twistlock CVE | Low | flask-appbuilder-4.1.4 |
CVE-2023-35798 | Twistlock CVE | Medium | apache-airflow-providers-microsoft-mssql-3.3.2 |
CVE-2023-32731 | Twistlock CVE | High | grpcio-1.51.1 |
CVE-2023-35797 | Twistlock CVE | Critical | apache-airflow-providers-apache-hive-5.1.1 |
CVE-2023-33234 | Twistlock CVE | High | apache-airflow-providers-cncf-kubernetes-5.1.1 |
CVE-2023-1428 | Twistlock CVE | High | grpcio-1.51.1 |
CVE-2023-32732 | Twistlock CVE | Medium | grpcio-1.51.1 |
CVE-2023-37415 | Twistlock CVE | High | apache-airflow-providers-apache-hive-5.1.1 |
CVE-2023-36543 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-35908 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-22887 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2022-46651 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-29406 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-29406 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-29406 | Twistlock CVE | Medium | go-1.18.2 |
CVE-2023-22888 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-37276 | Twistlock CVE | Medium | aiohttp-3.8.3 |
CVE-2022-40896 | Twistlock CVE | Medium | pygments-2.14.0 |
CVE-2023-37920 | Twistlock CVE | Critical | certifi-2022.12.7 |
GHSA-jm77-qphf-c4w8 | Twistlock CVE | Low | cryptography-38.0.4 |
CVE-2023-39508 | Twistlock CVE | High | apache-airflow-2.5.1 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-29409 | Twistlock CVE | Medium | go-1.18.2 |
CVE-2023-40267 | Twistlock CVE | Critical | gitpython-3.1.30 |
CVE-2023-39553 | Twistlock CVE | High | apache-airflow-providers-apache-drill-2.3.1 |
GHSA-qppv-j76h-2rpx | Twistlock CVE | Medium | tornado-6.1 |
CVE-2023-39441 | Twistlock CVE | Medium | apache-airflow-providers-imap-3.1.1 |
CVE-2023-39441 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-40273 | Twistlock CVE | High | apache-airflow-2.5.1 |
CVE-2023-37379 | Twistlock CVE | High | apache-airflow-2.5.1 |
PRISMA-2023-0033 | Twistlock CVE | Medium | pygments-2.14.0 |
CVE-2023-40590 | Twistlock CVE | High | gitpython-3.1.30 |
CVE-2023-41040 | Twistlock CVE | Medium | gitpython-3.1.30 |
CVE-2023-27561 | Twistlock CVE | High | github.com/opencontainers/runc-v1.1.0 |
CVE-2023-40712 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-39319 | Twistlock CVE | Medium | go-1.18.2 |
CVE-2023-39319 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-39319 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-39318 | Twistlock CVE | Medium | go-1.18.2 |
CVE-2023-39318 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-39318 | Twistlock CVE | Medium | go-1.19.6 |
CVE-2023-28642 | Twistlock CVE | Medium | github.com/opencontainers/runc-v1.1.0 |
CVE-2022-29162 | Twistlock CVE | Medium | github.com/opencontainers/runc-v1.1.0 |
CVE-2023-40611 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-25809 | Twistlock CVE | Low | github.com/opencontainers/runc-v1.1.0 |
CVE-2023-2248 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-36386 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3141 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1079 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-3594 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1116 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-3923 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-38201 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-4135 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4010 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-3892 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-23455 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4155 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2483 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-31083 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1249 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4387 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2162 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4273 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-33203 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-3545 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-36558 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3161 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1198 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-20569 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3389 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4039 | Anchore CVE | Medium | libgomp-11.3.1-4.3.el9 |
CVE-2023-1076 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4244 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1206 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3772 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4459 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3268 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3212 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4039 | Anchore CVE | Medium | libgcc-11.3.1-4.3.el9 |
CVE-2022-0382 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4881 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1073 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-31082 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1074 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4206 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-3523 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
GHSA-wpg8-mf6h-gm92 | Anchore CVE | Medium | apache-airflow-2.5.1 |
CVE-2022-0480 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1075 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-26140 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-25775 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-31085 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1972 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4207 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nss-softokn-3.90.0-3.el9_2 |
CVE-2023-3777 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1838 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-0597 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nss-sysinit-3.90.0-3.el9_2 |
CVE-2022-1974 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-40283 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1943 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-42895 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-34693 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1651 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-20154 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-45934 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-4543 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3611 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4039 | Anchore CVE | Medium | libstdc++-11.3.1-4.3.el9 |
CVE-2021-37159 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2019 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2021-44879 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-38457 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1281 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4039 | Anchore CVE | Medium | libstdc++-devel-11.3.1-4.3.el9 |
CVE-2023-2006 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3640 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-26144 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2156 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-1195 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-28464 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-38096 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1652 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-23824 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2020-26146 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-3773 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4421 | Anchore CVE | Medium | nss-util-3.90.0-3.el9_2 |
CVE-2023-1380 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-1989 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2176 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
GHSA-v8gr-m533-ghj9 | Anchore CVE | Low | cryptography-38.0.4 |
CVE-2022-27672 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-2163 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-42753 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
GHSA-x7m3-jprg-wc5g | Anchore CVE | Critical | gevent-22.10.2 |
CVE-2023-5197 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-42756 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-42752 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
GHSA-v845-jxx5-vc9f | Anchore CVE | Medium | urllib3-1.26.14 |
CVE-2023-39191 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-4610 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-42754 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-5345 | Anchore CVE | High | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-48566 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2007-4559 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2023-27043 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2007-4559 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2022-0391 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2021-23336 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-2.34-60.el9_2.7 |
CVE-2023-43804 | Anchore CVE | Medium | python3-urllib3-1.26.5-3.el9 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-headers-2.34-60.el9_2.7 |
CVE-2023-45322 | Anchore CVE | Medium | libxml2-2.9.13-3.el9_2.1 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-common-2.34-60.el9_2.7 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-common-2.34-60.el9_2.7 |
CVE-2023-39194 | Anchore CVE | Low | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2023-39193 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-48566 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-2.34-60.el9_2.7 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-devel-2.34-60.el9_2.7 |
CVE-2023-27043 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-langpack-en-2.34-60.el9_2.7 |
CVE-2021-23336 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2022-0391 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-minimal-langpack-2.34-60.el9_2.7 |
CVE-2022-48565 | Anchore CVE | Medium | python3-3.9.16-1.el9_2.2 |
CVE-2023-39189 | Anchore CVE | Medium | kernel-headers-5.14.0-284.30.1.el9_2 |
CVE-2022-48565 | Anchore CVE | Medium | python3-libs-3.9.16-1.el9_2.2 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-minimal-langpack-2.34-60.el9_2.7 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-headers-2.34-60.el9_2.7 |
CVE-2023-5156 | Anchore CVE | Medium | glibc-devel-2.34-60.el9_2.7 |
CVE-2023-43804 | Anchore CVE | Medium | python3-pip-wheel-21.2.3-6.el9 |
CVE-2023-0687 | Anchore CVE | Medium | glibc-langpack-en-2.34-60.el9_2.7 |
CVE-2023-5388 | Anchore CVE | Medium | nspr-4.35.0-3.el9_2 |
CVE-2023-5388 | Anchore CVE | Medium | nss-util-3.90.0-3.el9_2 |
CVE-2023-5388 | Anchore CVE | Medium | nss-softokn-3.90.0-3.el9_2 |
CVE-2023-5388 | Anchore CVE | Medium | nss-3.90.0-3.el9_2 |
CVE-2023-5388 | Anchore CVE | Medium | nss-sysinit-3.90.0-3.el9_2 |
CVE-2023-5388 | Anchore CVE | Medium | nss-softokn-freebl-3.90.0-3.el9_2 |
CVE-2018-20225 | Anchore CVE | High | pip-23.3 |
CVE-2023-38545 | Anchore CVE | High | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-27536 | Anchore CVE | Medium | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-27538 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-38546 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-27538 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-27534 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-27533 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-28320 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-27536 | Anchore CVE | Medium | curl-7.76.1-23.el9_2.4 |
CVE-2023-38546 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-27533 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2021-22925 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2023-27534 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-38545 | Anchore CVE | High | curl-7.76.1-23.el9_2.4 |
CVE-2023-28320 | Anchore CVE | Low | libcurl-minimal-7.76.1-23.el9_2.4 |
CVE-2021-22925 | Anchore CVE | Low | curl-7.76.1-23.el9_2.4 |
CVE-2023-44487 | Anchore CVE | High | libnghttp2-1.43.0-5.el9_2.1 |
GHSA-v8gr-m533-ghj9 | Twistlock CVE | Low | cryptography-38.0.4 |
CVE-2023-30608 | Twistlock CVE | High | sqlparse-0.4.3 |
CVE-2023-41419 | Twistlock CVE | Critical | gevent-22.10.2 |
CVE-2023-43804 | Twistlock CVE | High | urllib3-1.26.14 |
CVE-2023-39323 | Twistlock CVE | Critical | go-1.18.2 |
CVE-2023-39323 | Twistlock CVE | Critical | go-1.19.6 |
CVE-2023-39323 | Twistlock CVE | Critical | go-1.19.6 |
PRISMA-2022-0168 | Twistlock CVE | High | pip-23.3 |
CVE-2023-45803 | Twistlock CVE | Medium | urllib3-1.26.14 |
CVE-2023-42792 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-42780 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
CVE-2023-42663 | Twistlock CVE | Medium | apache-airflow-2.5.1 |
VAT: https://vat.dso.mil/vat/image?imageName=bitnami/airflow&tag=2.5.1&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=bitnami/airflow&tag=2.5.1&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.