chore(findings): opensource/metrostar/jupyterhub
Summary
opensource/metrostar/jupyterhub has 37 new findings discovered during continuous monitoring.
id | source | severity | package |
---|---|---|---|
cf4a2fad890da1a7af359c2619f8b810 | Anchore Compliance | Critical | |
683a3c52829f632324587ec0baec9fb3 | Anchore Compliance | Critical | |
GHSA-78xj-cgh5-2h22 | Anchore CVE | Medium | ip-2.0.0 |
GHSA-jchw-25xp-jwwc | Anchore CVE | Medium | follow-redirects-1.15.3 |
GHSA-cxjh-pqwp-8mfp | Anchore CVE | Medium | follow-redirects-1.15.3 |
GHSA-55m3-44xf-hg4h | Anchore CVE | High | oauthenticator-16.2.1 |
GHSA-7r3h-4ph8-w38g | Anchore CVE | High | jupyterhub-4.0.2 |
GHSA-f5x3-32g6-xq36 | Anchore CVE | Medium | tar-6.1.15 |
GHSA-jjg7-2v4v-x38h | Anchore CVE | Medium | idna-3.6 |
GHSA-7gpw-8wmc-pm8g | Anchore CVE | Medium | aiohttp-3.9.3 |
CVE-2021-31535 | Anchore CVE | High | libX11-1.7.0-9.el9 |
CVE-2021-31535 | Anchore CVE | High | libX11-common-1.7.0-9.el9 |
CVE-2022-3555 | Anchore CVE | Low | libX11-1.7.0-9.el9 |
CVE-2022-3555 | Anchore CVE | Low | libX11-xcb-1.7.0-9.el9 |
CVE-2022-3555 | Anchore CVE | Low | libX11-common-1.7.0-9.el9 |
CVE-2022-3554 | Anchore CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2022-3554 | Anchore CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2021-31535 | Anchore CVE | High | libX11-xcb-1.7.0-9.el9 |
CVE-2022-3554 | Anchore CVE | Medium | libX11-1.7.0-9.el9 |
GHSA-h75v-3vvj-5mfj | Anchore CVE | Medium | Jinja2-3.1.3 |
GHSA-g7vv-2v7x-gj9p | Anchore CVE | Low | tqdm-4.66.2 |
GHSA-5m98-qgg9-wh84 | Anchore CVE | High | aiohttp-3.9.3 |
CCE-83629-6 | OSCAP Compliance | Medium | |
CVE-2024-29033 | Twistlock CVE | High | oauthenticator-16.2.1 |
CVE-2024-28233 | Twistlock CVE | High | jupyterhub-4.0.2 |
CVE-2024-3651 | Twistlock CVE | Medium | idna-3.6 |
CVE-2024-27306 | Twistlock CVE | Medium | aiohttp-3.9.3 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-common-1.7.0-9.el9 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-xcb-1.7.0-9.el9 |
CVE-2021-31535 | Twistlock CVE | Medium | libX11-1.7.0-9.el9 |
CVE-2024-30251 | Twistlock CVE | High | aiohttp-3.9.3 |
CVE-2024-34062 | Twistlock CVE | Low | tqdm-4.66.2 |
CVE-2024-34064 | Twistlock CVE | Medium | jinja2-3.1.3 |
CVE-2023-42282 | Twistlock CVE | Critical | ip-2.0.0 |
CVE-2024-28863 | Twistlock CVE | Medium | tar-6.1.15 |
CVE-2024-28849 | Twistlock CVE | Medium | follow-redirects-1.15.3 |
CVE-2023-26159 | Twistlock CVE | Medium | follow-redirects-1.15.3 |
VAT: https://vat.dso.mil/vat/image?imageName=opensource/metrostar/jupyterhub&tag=jupyterhub_v10&branch=master
More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=opensource/metrostar/jupyterhub&tag=jupyterhub_v7&branch=master
Tasks
Contributor:
-
Provide justifications for findings in the VAT (docs) -
Apply the ~"Hardening::Verification" label to this issue and wait for feedback
Iron Bank:
-
Review findings and justifications
Note: If the above process is rejected for any reason, the
Verification
label will be removed and the issue will be sent back toOpen
. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add theVerification
label.
Questions?
Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding
.
Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.