aleveille opened a new pull request, #28902:
URL: https://github.com/apache/airflow/pull/28902

   This is Helm/Kubernetes change only to update the git-sync container from 
v3.4.0 to v3.6.2.
   
   The v3.4.0 version is a bit old and has several security vulnerabilities.
   
   
   snyk container test k8s.gcr.io/git-sync/git-sync:v3.4.0
   ```
   ✗ High severity vulnerability found in zlib/zlib1g
     Description: Out-of-bounds Write
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-ZLIB-2433934
     Introduced through: meta-common-packages@meta
     From: meta-common-packages@meta > zlib/zlib1g@1:1.2.11.dfsg-1
     Fixed in: 1:1.2.11.dfsg-1+deb10u1
   
   ✗ High severity vulnerability found in xz-utils/liblzma5
     Description: Improper Input Validation
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-XZUTILS-2444279
     Introduced through: meta-common-packages@meta
     From: meta-common-packages@meta > xz-utils/[email protected]
     Fixed in: 5.2.4-1+deb10u1
   
   ✗ High severity vulnerability found in openssl/libssl1.1
     Description: Loop with Unreachable Exit Condition ('Infinite Loop')
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-2426310
     Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
[email protected], ca-certificates@20200601~deb10u2, git@1:2.30.2-1~bpo10+1
     From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u7
     From: [email protected] > openssl/[email protected]+deb10u7
     From: ca-certificates@20200601~deb10u2 > [email protected]+deb10u7 > 
openssl/[email protected]+deb10u7
     and 2 more...
     Fixed in: 1.1.1d-0+deb10u8
   
   ✗ High severity vulnerability found in ncurses/libtinfo6
     Description: Out-of-bounds Read
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-NCURSES-2767192
     Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2
     From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
libedit/[email protected] > ncurses/[email protected]+20181013-2+deb10u2
     Fixed in: 6.1+20181013-2+deb10u3
   
   ✗ High severity vulnerability found in krb5/libkrb5support0
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-KRB5-3120879
     Introduced through: git@1:2.30.2-1~bpo10+1, 
openssh/openssh-client@1:7.9p1-10+deb10u2
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
krb5/[email protected]+deb10u3 > krb5/[email protected]+deb10u3
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
krb5/[email protected]+deb10u3 > krb5/[email protected]+deb10u3 > 
krb5/[email protected]+deb10u3
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
krb5/[email protected]+deb10u3 > krb5/[email protected]+deb10u3 > 
krb5/[email protected]+deb10u3
     and 7 more...
     Fixed in: 1.17-3+deb10u5
   
   ✗ High severity vulnerability found in gzip
     Description: Improper Input Validation
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GZIP-2444259
     Introduced through: [email protected]
     From: [email protected]
     Fixed in: 1.9-3+deb10u1
   
   ✗ High severity vulnerability found in gnutls28/libgnutls30
     Description: Double Free
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GNUTLS28-2964217
     Introduced through: [email protected], git@1:2.30.2-1~bpo10+1
     From: [email protected] > gnutls28/[email protected]+deb10u7
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
gnutls28/[email protected]+deb10u7
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
openldap/[email protected]+dfsg-3+deb10u6 > 
gnutls28/[email protected]+deb10u7
     and 1 more...
     Fixed in: 3.6.7-4+deb10u9
   
   ✗ High severity vulnerability found in gmp/libgmp10
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GMP-1920939
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
gnutls28/[email protected]+deb10u7 > gmp/libgmp10@2:6.1.2+dfsg-4
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
rtmpdump/[email protected]+20151223.gitfa8646d.1-2 > gmp/libgmp10@2:6.1.2+dfsg-4
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
gnutls28/[email protected]+deb10u7 > nettle/[email protected]+deb10u1 > 
gmp/libgmp10@2:6.1.2+dfsg-4
     Fixed in: 2:6.1.2+dfsg-4+deb10u1
   
   ✗ High severity vulnerability found in glibc/libc-bin
     Description: Reachable Assertion
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1065768
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ High severity vulnerability found in glibc/libc-bin
     Description: Off-by-one Error
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-2340921
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ High severity vulnerability found in glibc/libc-bin
     Description: Out-of-bounds Write
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559488
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
   
   ✗ High severity vulnerability found in glibc/libc-bin
     Description: Use After Free
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-559493
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ High severity vulnerability found in glibc/libc-bin
     Description: Signed to Unsigned Conversion Error
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-564233
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ High severity vulnerability found in gcc-8/libstdc++6
     Description: Information Exposure
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558
     Introduced through: gcc-8/[email protected], [email protected], 
meta-common-packages@meta
     From: gcc-8/[email protected]
     From: [email protected] > gcc-8/[email protected]
     From: [email protected] > apt/[email protected] > gcc-8/[email protected]
     and 2 more...
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Incorrect Calculation
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2329087
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2330888
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331795
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331796
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331820
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2384929
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2406126
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u3
   
   ✗ High severity vulnerability found in expat/libexpat1
     Description: Use After Free
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-3061092
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u6
   
   ✗ High severity vulnerability found in cyrus-sasl2/libsasl2-modules-db
     Description: SQL Injection
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CYRUSSASL2-2412041
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
openldap/[email protected]+dfsg-3+deb10u6 > 
cyrus-sasl2/[email protected]+dfsg-1+deb10u1 > 
cyrus-sasl2/[email protected]+dfsg-1+deb10u1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
openldap/[email protected]+dfsg-3+deb10u6 > 
cyrus-sasl2/[email protected]+dfsg-1+deb10u1
     Fixed in: 2.1.27+dfsg-1+deb10u2
   
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Cleartext Transmission of Sensitive Information
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-1585139
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2
     Fixed in: 7.64.0-4+deb10u3
   
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Improper Authentication
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-2805484
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2
     Fixed in: 7.64.0-4+deb10u3
   
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Improper Certificate Validation
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-2813757
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2
     Fixed in: 7.64.0-4+deb10u3
   
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Loop with Unreachable Exit Condition ('Infinite Loop')
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-2813772
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2
     Fixed in: 7.64.0-4+deb10u3
   
   ✗ Critical severity vulnerability found in zlib/zlib1g
     Description: Out-of-bounds Write
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-ZLIB-2976149
     Introduced through: meta-common-packages@meta
     From: meta-common-packages@meta > zlib/zlib1g@1:1.2.11.dfsg-1
     Fixed in: 1:1.2.11.dfsg-1+deb10u2
   
   ✗ Critical severity vulnerability found in openssl/libssl1.1
     Description: OS Command Injection
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-2807585
     Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
[email protected], ca-certificates@20200601~deb10u2, git@1:2.30.2-1~bpo10+1
     From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u7
     From: [email protected] > openssl/[email protected]+deb10u7
     From: ca-certificates@20200601~deb10u2 > [email protected]+deb10u7 > 
openssl/[email protected]+deb10u7
     and 2 more...
     Fixed in: 1.1.1n-0+deb10u2
   
   ✗ Critical severity vulnerability found in openssl/libssl1.1
     Description: OS Command Injection
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENSSL-2933515
     Introduced through: openssh/openssh-client@1:7.9p1-10+deb10u2, 
[email protected], ca-certificates@20200601~deb10u2, git@1:2.30.2-1~bpo10+1
     From: openssh/openssh-client@1:7.9p1-10+deb10u2 > 
openssl/[email protected]+deb10u7
     From: [email protected] > openssl/[email protected]+deb10u7
     From: ca-certificates@20200601~deb10u2 > [email protected]+deb10u7 > 
openssl/[email protected]+deb10u7
     and 2 more...
     Fixed in: 1.1.1n-0+deb10u3
   
   ✗ Critical severity vulnerability found in openldap/libldap-common
     Description: SQL Injection
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-OPENLDAP-2808412
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
openldap/[email protected]+dfsg-3+deb10u6 > 
openldap/[email protected]+dfsg-3+deb10u6
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
openldap/[email protected]+dfsg-3+deb10u6
     Fixed in: 2.4.47+dfsg-3+deb10u7
   
   ✗ Critical severity vulnerability found in libtasn1-6
     Description: Out-of-bounds Read
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-LIBTASN16-3061094
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2 > 
gnutls28/[email protected]+deb10u7 > [email protected]
     Fixed in: 4.13-3+deb10u1
   
   ✗ Critical severity vulnerability found in glibc/libc-bin
     Description: Use After Free
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1296899
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ Critical severity vulnerability found in glibc/libc-bin
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-1315333
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ Critical severity vulnerability found in glibc/libc-bin
     Description: Buffer Overflow
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-2340915
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ Critical severity vulnerability found in glibc/libc-bin
     Description: Buffer Overflow
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-GLIBC-2340923
     Introduced through: glibc/[email protected], meta-common-packages@meta
     From: glibc/[email protected]
     From: meta-common-packages@meta > glibc/[email protected]
     Fixed in: 2.28-10+deb10u2
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331803
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331813
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2331818
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2359258
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u2
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Improper Encoding or Escaping of Output
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2403513
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u3
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Exposure of Resource to Wrong Sphere
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2403518
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u3
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Integer Overflow or Wraparound
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-2406128
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u3
   
   ✗ Critical severity vulnerability found in expat/libexpat1
     Description: Use After Free
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-EXPAT-3023032
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > expat/[email protected]+deb10u1
     Fixed in: 2.2.6-2+deb10u5
   
   ✗ Critical severity vulnerability found in dpkg
     Description: Directory Traversal
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-DPKG-2847944
     Introduced through: meta-common-packages@meta
     From: meta-common-packages@meta > [email protected]
     Fixed in: 1.19.8
   
   ✗ Critical severity vulnerability found in curl/libcurl3-gnutls
     Description: Exposure of Resource to Wrong Sphere
     Info: https://snyk.io/vuln/SNYK-DEBIAN10-CURL-3065760
     Introduced through: git@1:2.30.2-1~bpo10+1
     From: git@1:2.30.2-1~bpo10+1 > curl/[email protected]+deb10u2
   ```
   
   
   As a comparison, the v3.6.2 has only two known High and two known Critical 
vulnerabilities:
   
   snyk container test k8s.gcr.io/git-sync/git-sync:v3.6.2
   ```
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Cleartext Transmission of Sensitive Information
     Info: https://snyk.io/vuln/SNYK-DEBIAN11-CURL-3066040
     Introduced through: git@1:2.30.2-1
     From: git@1:2.30.2-1 > curl/[email protected]+deb11u3
   
   ✗ High severity vulnerability found in curl/libcurl3-gnutls
     Description: Cleartext Transmission of Sensitive Information
     Info: https://snyk.io/vuln/SNYK-DEBIAN11-CURL-3179181
     Introduced through: git@1:2.30.2-1
     From: git@1:2.30.2-1 > curl/[email protected]+deb11u3
   
   ✗ Critical severity vulnerability found in libtasn1-6
     Description: Out-of-bounds Read
     Info: https://snyk.io/vuln/SNYK-DEBIAN11-LIBTASN16-3061097
     Introduced through: git@1:2.30.2-1
     From: git@1:2.30.2-1 > curl/[email protected]+deb11u3 > 
gnutls28/[email protected]+deb11u2 > [email protected]
     Fixed in: 4.16.0-2+deb11u1
   
   ✗ Critical severity vulnerability found in curl/libcurl3-gnutls
     Description: Exposure of Resource to Wrong Sphere
     Info: https://snyk.io/vuln/SNYK-DEBIAN11-CURL-3065656
     Introduced through: git@1:2.30.2-1
     From: git@1:2.30.2-1 > curl/[email protected]+deb11u3
   ```
   
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to