UNCLASSIFIED - NO CUI

Skip to content

chore(findings): bitnami/airflow-worker

Summary

bitnami/airflow-worker has 81 new findings discovered during continuous monitoring.

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-worker&tag=2.9.3&branch=master

id source severity package
9d7be138577efc4d9fdfe0580d849284 Anchore Compliance Critical
c45a3cdf4974ce9efa7f2078409cf7bc Anchore Compliance Critical
40cf73571ff8eeb93b41f263a88fb4dd Anchore Compliance Critical
GHSA-6vqw-3v5j-54x4 Anchore CVE High cryptography-41.0.7
CVE-2024-30205 Anchore CVE Medium emacs-filesystem-1:27.2-9.el9
CVE-2024-6345 Anchore CVE High python3.11-setuptools-wheel-65.5.1-2.el9
CVE-2024-6923 Anchore CVE Medium python3.11-libs-3.11.7-1.el9_4.3
CVE-2023-45918 Anchore CVE Low ncurses-compat-libs-6.2-10.20210508.el9
CVE-2024-30203 Anchore CVE Medium emacs-filesystem-1:27.2-9.el9
CVE-2023-26268 Anchore CVE Medium cloudant-2.15.0
GHSA-cx63-2mw6-8hw5 Anchore CVE High setuptools-68.2.2
CVE-2024-0232 Anchore CVE Low sqlite-3.34.1-7.el9_3
CVE-2023-51767 Anchore CVE Medium openssh-clients-8.7p1-38.el9_4.4
CVE-2024-0450 Anchore CVE Medium python3.11-3.11.7-1.el9_4.3
GHSA-34jh-p97f-mpxf Anchore CVE Medium urllib3-2.0.7
CVE-2022-40896 Anchore CVE Medium python3.11-pip-wheel-22.3.1-5.el9
CVE-2022-29458 Anchore CVE Low ncurses-6.2-10.20210508.el9
CVE-2023-50495 Anchore CVE Low ncurses-6.2-10.20210508.el9
CVE-2023-51767 Anchore CVE Medium openssh-8.7p1-38.el9_4.4
CVE-2023-36632 Anchore CVE Medium python3.11-3.11.7-1.el9_4.3
CVE-2024-6923 Anchore CVE Medium python3.11-3.11.7-1.el9_4.3
CVE-2017-1000383 Anchore CVE Low emacs-filesystem-1:27.2-9.el9
GHSA-3ww4-gg4f-jr7f Anchore CVE High cryptography-41.0.7
CVE-2023-24056 Anchore CVE Low pkgconf-1.7.3-10.el9
CVE-2023-45918 Anchore CVE Low ncurses-6.2-10.20210508.el9
GHSA-2g68-c3qc-8985 Anchore CVE High Werkzeug-2.2.3
CVE-2016-20012 Anchore CVE Low openssh-clients-8.7p1-38.el9_4.4
CVE-2024-0450 Anchore CVE Medium python3.11-libs-3.11.7-1.el9_4.3
CVE-2024-2398 Anchore CVE Medium curl-7.76.1-29.el9_4
CVE-2022-27943 Anchore CVE Low libstdc++-devel-11.4.1-3.el9
CVE-2024-39331 Anchore CVE Medium emacs-filesystem-1:27.2-9.el9
CVE-2016-20012 Anchore CVE Low openssh-8.7p1-38.el9_4.4
GHSA-jwhx-xcg6-8xhj Anchore CVE Medium aiohttp-3.9.5
CVE-2023-24056 Anchore CVE Low pkgconf-m4-1.7.3-10.el9
CVE-2023-36632 Anchore CVE Medium python3.11-libs-3.11.7-1.el9_4.3
CVE-2022-29458 Anchore CVE Low ncurses-compat-libs-6.2-10.20210508.el9
CVE-2023-50495 Anchore CVE Low ncurses-compat-libs-6.2-10.20210508.el9
CVE-2023-24056 Anchore CVE Low pkgconf-pkg-config-1.7.3-10.el9
GHSA-9v9h-cgj8-h64p Anchore CVE Medium cryptography-41.0.7
GHSA-9wx4-h78v-vm56 Anchore CVE Medium requests-2.31.0
CVE-2023-36191 Anchore CVE Low sqlite-3.34.1-7.el9_3
GHSA-hrfv-mqp8-q5rw Anchore CVE Medium Werkzeug-2.2.3
CVE-2024-30204 Anchore CVE Medium emacs-filesystem-1:27.2-9.el9
CVE-2023-24056 Anchore CVE Low libpkgconf-1.7.3-10.el9
CVE-2024-6345 Twistlock CVE High python3.11-setuptools-wheel-65.5.1-2.el9
PRISMA-2022-0168 Twistlock CVE High pip-24.2
PRISMA-2023-0035 Twistlock CVE High werkzeug-2.2.3
PRISMA-2023-0024 Twistlock CVE High aiohttp-3.9.5
CVE-2024-34069 Twistlock CVE High werkzeug-2.2.3
CVE-2024-26130 Twistlock CVE High cryptography-41.0.7
CVE-2023-50782 Twistlock CVE High cryptography-41.0.7
CVE-2023-46136 Twistlock CVE High werkzeug-2.2.3
CVE-2024-39331 Twistlock CVE Medium emacs-filesystem-27.2-9.el9
CVE-2024-30205 Twistlock CVE Medium emacs-filesystem-27.2-9.el9
CVE-2024-2398 Twistlock CVE Medium curl-7.76.1-29.el9_4
CVE-2023-51767 Twistlock CVE Medium openssh-8.7p1-38.el9_4.4
CVE-2023-51767 Twistlock CVE Medium openssh-clients-8.7p1-38.el9_4.4
CVE-2024-6923 Twistlock CVE Medium python3.11-libs-3.11.7-1.el9_4.3
CVE-2024-6923 Twistlock CVE Medium python3.11-3.11.7-1.el9_4.3
CVE-2024-0450 Twistlock CVE Medium python3.11-libs-3.11.7-1.el9_4.3
CVE-2024-0450 Twistlock CVE Medium python3.11-3.11.7-1.el9_4.3
CVE-2024-35195 Twistlock CVE Medium requests-2.31.0
CVE-2024-30204 Twistlock CVE Medium emacs-filesystem-27.2-9.el9
CVE-2024-30203 Twistlock CVE Medium emacs-filesystem-27.2-9.el9
CVE-2024-0727 Twistlock CVE Medium cryptography-41.0.7
CVE-2022-40896 Twistlock CVE Medium python3.11-pip-wheel-22.3.1-5.el9
CVE-2024-42367 Twistlock CVE Medium aiohttp-3.9.5
CVE-2024-37891 Twistlock CVE Medium urllib3-2.0.7
CVE-2023-50495 Twistlock CVE Low ncurses-6.2-10.20210508.el9
CVE-2022-29458 Twistlock CVE Low ncurses-6.2-10.20210508.el9
CVE-2023-24056 Twistlock CVE Low pkgconf-m4-1.7.3-10.el9
CVE-2023-24056 Twistlock CVE Low libpkgconf-1.7.3-10.el9
CVE-2023-24056 Twistlock CVE Low pkgconf-pkg-config-1.7.3-10.el9
CVE-2023-24056 Twistlock CVE Low pkgconf-1.7.3-10.el9
CVE-2022-27943 Twistlock CVE Low libstdc++-devel-11.4.1-3.el9
CVE-2017-1000383 Twistlock CVE Low emacs-filesystem-27.2-9.el9
CVE-2024-7264 Twistlock CVE Low curl-7.76.1-29.el9_4
CVE-2024-0397 Twistlock CVE Low python3.11-libs-3.11.7-1.el9_4.3
CVE-2024-0397 Twistlock CVE Low python3.11-3.11.7-1.el9_4.3
CVE-2024-0232 Twistlock CVE Low sqlite-3.34.1-7.el9_3
CVE-2023-45918 Twistlock CVE Low ncurses-6.2-10.20210508.el9

More information can be found in the VAT located here: https://vat.dso.mil/vat/image?imageName=bitnami/airflow-worker&tag=2.9.3&branch=master

Tasks

Contributor:

  • Provide justifications for findings in the VAT (docs)
  • Apply the StatusVerification label to this issue and wait for feedback

Iron Bank:

  • Review findings and justifications

Note: If the above process is rejected for any reason, the Verification label will be removed and the issue will be sent back to Open. Any comments will be listed in this issue for you to address. Once they have been addressed, you must re-add the Verification label.

Questions?

Contact the Iron Bank team by commenting on this issue with your questions or concerns. If you do not receive a response, add /cc @ironbank-notifications/onboarding.

Additionally, Iron Bank hosts an AMA working session every Wednesday from 1630-1730EST to answer questions.

Edited by Ghost User
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information