Skip to content

fix(ui): Test suite add-test-case modal and table UX#26466

Closed
shah-harshit wants to merge 41 commits intomainfrom
fix/test-suite-add-test-case-modal-and-table-ux
Closed

fix(ui): Test suite add-test-case modal and table UX#26466
shah-harshit wants to merge 41 commits intomainfrom
fix/test-suite-add-test-case-modal-and-table-ux

Conversation

@shah-harshit
Copy link
Copy Markdown
Contributor

@shah-harshit shah-harshit commented Mar 13, 2026

Description

Improves the Add test case flow and test case table on the Test Suite details page.

Issue:
Screenshot 2026-03-13 at 2 56 19 PM
Screenshot 2026-03-13 at 2 55 38 PM

Fix:
Screenshot 2026-03-13 at 2 54 36 PM
Screenshot 2026-03-13 at 2 54 56 PM

Changes

  1. SearchDropdown clickable in core-ui modal

    • Added getPopupContainer prop to SearchDropdown so the dropdown overlay can be rendered inside a specific container (e.g. the modal).
    • Threaded getPopupContainer from TestSuiteDetailsPage through AddTestCaseList and AddTestCaseListFilters so filter dropdowns (Table, Column, Status, Type) render inside the Add test case modal and remain clickable.
  2. Wider status column in test case tab

    • Increased the status column width from 80px to 120px in DataQualityTab so status labels (Success, Failed, Aborted, Queued) display without truncation.

Testing

  • Open a Test Suite details page → click Add test case → confirm filter dropdowns (Table, Column, Status, Type) open and are clickable inside the modal.
  • Confirm the modal opens with no test cases pre-selected.
  • Confirm the Status column in the Test cases tab has enough width for the status badges.

shah-harshit and others added 30 commits March 6, 2026 16:39
…d E2E coverage

- Add filters to AddTestCaseList: Status (single), Test type (single), Table (multi), Column (multi)
- Use SearchDropdown for all four filters with hideCounts
- Client-side filtering for Table/Column; API refetch for Status/Test type
- Add AddTestCaseListFilters component and constants
- Add AddTestCaseList.utils (getTableFilterOptions, getColumnFilterOptions, filterTestCasesByTableAndColumn, getSelectedOptionsFromKeys)
- Unit tests: AddTestCaseList.component.test.tsx (filter tests), AddTestCaseList.utils.test.ts
- E2E: TestSuite.spec.ts - flatten steps, verify/apply/clear filters in create flow

Fixes open-metadata/openmetadata-collate#3045

Made-with: Cursor
@shah-harshit shah-harshit changed the base branch from collate-issue-3045 to main March 16, 2026 07:24
@shah-harshit shah-harshit changed the base branch from main to collate-issue-3045 March 16, 2026 07:25
entity: t('label.test-case-plural'),
})}
</Button>
<ModalOverlay>
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Bug: Modal loses max-height and scroll, content may overflow

The old modal explicitly set max-h-[90vh] on the Dialog container and wrapped the content in a tw:flex-1 tw:overflow-y-auto div. The new code uses bare <Modal> / <Dialog> / <Dialog.Content> which internally do not provide a max-height constraint or content-area scrolling.

When AddTestCaseList renders a long list of test cases, the dialog will grow beyond the viewport height with no way to scroll, making the Cancel/Submit buttons unreachable.

Additionally, the old code used tw:bg-background-paper while the Dialog component defaults to tw:bg-primary, which may cause a visual difference.

Suggested fix:

<ModalOverlay>
  <Modal className="tw:max-w-2xl">
    <Dialog
      showCloseButton
      className="tw:max-h-[90vh] tw:flex tw:flex-col tw:overflow-hidden"
      title={t('label.add-entity', {
        entity: t('label.test-case-plural'),
      })}
      onClose={() => setIsTestCaseModalOpen(false)}>
      <Dialog.Content className="tw:flex-1 tw:overflow-y-auto">
        <AddTestCaseList ... />
      </Dialog.Content>
    </Dialog>
  </Modal>
</ModalOverlay>

Was this helpful? React with 👍 / 👎 | Reply gitar fix to apply this suggestion

@shah-harshit shah-harshit changed the base branch from collate-issue-3045 to main March 16, 2026 08:59
@gitar-bot
Copy link
Copy Markdown

gitar-bot bot commented Mar 16, 2026

Code Review ⚠️ Changes requested 2 resolved / 4 findings

Fixes test suite modal and table UX but introduces two critical issues: the modal loses max-height and scroll causing content overflow, and set_database_tags_map lacks empty TAG_VALUE validation unlike its schema counterpart.

⚠️ Bug: Modal loses max-height and scroll, content may overflow

📄 openmetadata-ui/src/main/resources/ui/src/pages/TestSuiteDetailsPage/TestSuiteDetailsPage.component.tsx:591

The old modal explicitly set max-h-[90vh] on the Dialog container and wrapped the content in a tw:flex-1 tw:overflow-y-auto div. The new code uses bare <Modal> / <Dialog> / <Dialog.Content> which internally do not provide a max-height constraint or content-area scrolling.

When AddTestCaseList renders a long list of test cases, the dialog will grow beyond the viewport height with no way to scroll, making the Cancel/Submit buttons unreachable.

Additionally, the old code used tw:bg-background-paper while the Dialog component defaults to tw:bg-primary, which may cause a visual difference.

Suggested fix
<ModalOverlay>
  <Modal className="tw:max-w-2xl">
    <Dialog
      showCloseButton
      className="tw:max-h-[90vh] tw:flex tw:flex-col tw:overflow-hidden"
      title={t('label.add-entity', {
        entity: t('label.test-case-plural'),
      })}
      onClose={() => setIsTestCaseModalOpen(false)}>
      <Dialog.Content className="tw:flex-1 tw:overflow-y-auto">
        <AddTestCaseList ... />
      </Dialog.Content>
    </Dialog>
  </Modal>
</ModalOverlay>
⚠️ Edge Case: set_database_tags_map missing empty TAG_VALUE validation

📄 ingestion/src/metadata/ingestion/source/database/snowflake/metadata.py:362 📄 ingestion/src/metadata/ingestion/source/database/snowflake/metadata.py:346

set_database_tags_map does not check for empty/None TAG_VALUE before appending to the map, unlike the analogous set_schema_tags_map which explicitly skips tags with empty values and logs a warning. Snowflake tags with empty values will be stored and later passed to yield_database_tag, get_schema_tag_labels, and get_tag_labels, potentially causing malformed tag entries to be ingested.

Suggested fix
for row in conn.execute(...):
    db_name = row.DATABASE_NAME
    if not row.TAG_VALUE:
        logger.warning(
            f"Skipping tag '{row.TAG_NAME}' for database '{db_name}' - "
            "TAG_VALUE is empty. Snowflake tags require a value to be ingested."
        )
        continue
    if db_name not in self.database_tags_map:
        self.database_tags_map[db_name] = []
    self.database_tags_map[db_name].append(
        {"tag_name": row.TAG_NAME, "tag_value": row.TAG_VALUE}
    )
✅ 2 resolved
Quality: Redundant onPress handler on DialogTrigger's button

📄 openmetadata-ui/src/main/resources/ui/src/pages/TestSuiteDetailsPage/TestSuiteDetailsPage.component.tsx:587
The <Button> inside <DialogTrigger> has an explicit onPress={() => setIsTestCaseModalOpen(true)}, but DialogTrigger with isOpen/onOpenChange already manages open state via its child trigger. The onPress is redundant and could cause a double state update. Consider removing it and letting DialogTrigger handle the open toggle via onOpenChange.

Bug: Pre-selection not actually removed despite PR intent

📄 openmetadata-ui/src/main/resources/ui/src/pages/TestSuiteDetailsPage/TestSuiteDetailsPage.component.tsx:607
The PR description states "the list no longer pre-selects test cases that are already in the suite", but the code still passes selectedTest={selectedTestCases} to AddTestCaseList (line ~607). selectedTestCases is derived from testCaseResult via useMemo and contains the names of all currently loaded test cases. Inside AddTestCaseList.fetchTestCases, when selectedTest is truthy, matching items are added to selectedItems state, causing them to appear pre-checked in the modal.

To actually remove pre-selection, stop passing selectedTest or pass an empty array.

🤖 Prompt for agents
Code Review: Fixes test suite modal and table UX but introduces two critical issues: the modal loses max-height and scroll causing content overflow, and set_database_tags_map lacks empty TAG_VALUE validation unlike its schema counterpart.

1. ⚠️ Bug: Modal loses max-height and scroll, content may overflow
   Files: openmetadata-ui/src/main/resources/ui/src/pages/TestSuiteDetailsPage/TestSuiteDetailsPage.component.tsx:591

   The old modal explicitly set `max-h-[90vh]` on the Dialog container and wrapped the content in a `tw:flex-1 tw:overflow-y-auto` div. The new code uses bare `<Modal>` / `<Dialog>` / `<Dialog.Content>` which internally do **not** provide a max-height constraint or content-area scrolling.
   
   When `AddTestCaseList` renders a long list of test cases, the dialog will grow beyond the viewport height with no way to scroll, making the Cancel/Submit buttons unreachable.
   
   Additionally, the old code used `tw:bg-background-paper` while the Dialog component defaults to `tw:bg-primary`, which may cause a visual difference.

   Suggested fix:
   <ModalOverlay>
     <Modal className="tw:max-w-2xl">
       <Dialog
         showCloseButton
         className="tw:max-h-[90vh] tw:flex tw:flex-col tw:overflow-hidden"
         title={t('label.add-entity', {
           entity: t('label.test-case-plural'),
         })}
         onClose={() => setIsTestCaseModalOpen(false)}>
         <Dialog.Content className="tw:flex-1 tw:overflow-y-auto">
           <AddTestCaseList ... />
         </Dialog.Content>
       </Dialog>
     </Modal>
   </ModalOverlay>

2. ⚠️ Edge Case: set_database_tags_map missing empty TAG_VALUE validation
   Files: ingestion/src/metadata/ingestion/source/database/snowflake/metadata.py:362, ingestion/src/metadata/ingestion/source/database/snowflake/metadata.py:346

   `set_database_tags_map` does not check for empty/None `TAG_VALUE` before appending to the map, unlike the analogous `set_schema_tags_map` which explicitly skips tags with empty values and logs a warning. Snowflake tags with empty values will be stored and later passed to `yield_database_tag`, `get_schema_tag_labels`, and `get_tag_labels`, potentially causing malformed tag entries to be ingested.

   Suggested fix:
   for row in conn.execute(...):
       db_name = row.DATABASE_NAME
       if not row.TAG_VALUE:
           logger.warning(
               f"Skipping tag '{row.TAG_NAME}' for database '{db_name}' - "
               "TAG_VALUE is empty. Snowflake tags require a value to be ingested."
           )
           continue
       if db_name not in self.database_tags_map:
           self.database_tags_map[db_name] = []
       self.database_tags_map[db_name].append(
           {"tag_name": row.TAG_NAME, "tag_value": row.TAG_VALUE}
       )

Options

Auto-apply is off → Gitar will not commit updates to this branch.
Display: compact → Showing less information.

Comment with these commands to change:

Auto-apply Compact
gitar auto-apply:on         
gitar display:verbose         

Was this helpful? React with 👍 / 👎 | Gitar

@shah-harshit
Copy link
Copy Markdown
Contributor Author

Not required, this is fixed here

@github-actions
Copy link
Copy Markdown
Contributor

🛡️ TRIVY SCAN RESULT 🛡️

Target: openmetadata-ingestion-base-slim:trivy (debian 12.13)

Vulnerabilities (257)

Package Vulnerability ID Severity Installed Version Fixed Version
imagemagick CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6-common CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
imagemagick-6.q16 CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-arch-config CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6-headers CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6 CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-6-extra CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-6.q16-dev CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickcore-dev CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6-headers CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-6 CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-6.q16-dev CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25897 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25898 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25968 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25983 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25986 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25987 🔥 CRITICAL 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-24481 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-24485 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25795 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25796 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25799 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25965 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25970 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25988 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-25989 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-26066 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-26283 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
libmagickwand-dev CVE-2026-27798 🚨 HIGH 8:6.9.11.60+dfsg-1.6+deb12u6 8:6.9.11.60+dfsg-1.6+deb12u7
linux-libc-dev CVE-2025-37786 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2025-37822 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2025-38201 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2025-40082 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2025-71089 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2025-71238 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2026-23111 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2026-23112 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2026-23193 🚨 HIGH 6.1.162-1 6.1.164-1
linux-libc-dev CVE-2026-23209 🚨 HIGH 6.1.162-1 6.1.164-1

🛡️ TRIVY SCAN RESULT 🛡️

Target: Java

Vulnerabilities (37)

Package Vulnerability ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-core CVE-2025-52999 🚨 HIGH 2.12.7 2.15.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.12.7 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-core CVE-2025-52999 🚨 HIGH 2.13.4 2.15.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.13.4 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.15.2 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 🚨 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 🚨 HIGH 2.12.7 2.12.7.1, 2.13.4
com.google.code.gson:gson CVE-2022-25647 🚨 HIGH 2.2.4 2.8.9
com.google.protobuf:protobuf-java CVE-2021-22569 🚨 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2022-3509 🚨 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 🚨 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 🚨 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2021-22569 🚨 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2022-3509 🚨 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 🚨 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 🚨 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 🚨 HIGH 9.8.1 9.37.2
com.squareup.okhttp3:okhttp CVE-2021-0341 🚨 HIGH 3.12.12 4.9.2
commons-beanutils:commons-beanutils CVE-2025-48734 🚨 HIGH 1.9.4 1.11.0
commons-io:commons-io CVE-2024-47554 🚨 HIGH 2.8.0 2.14.0
dnsjava:dnsjava CVE-2024-25638 🚨 HIGH 2.1.7 3.6.0
io.airlift:aircompressor CVE-2025-67721 🚨 HIGH 0.27 2.0.3
io.netty:netty-codec-http2 CVE-2025-55163 🚨 HIGH 4.1.96.Final 4.2.4.Final, 4.1.124.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p 🚨 HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2025-24970 🚨 HIGH 4.1.96.Final 4.1.118.Final
net.minidev:json-smart CVE-2021-31684 🚨 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 🚨 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 🔥 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 🚨 HIGH 1.7.7 1.11.3
org.apache.derby:derby CVE-2022-46337 🔥 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 🚨 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 🚨 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 🚨 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 🚨 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 🔥 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.eclipse.jetty:jetty-server CVE-2024-13009 🚨 HIGH 9.4.56.v20240826 9.4.57.v20241219
org.lz4:lz4-java CVE-2025-12183 🚨 HIGH 1.8.0 1.8.1

🛡️ TRIVY SCAN RESULT 🛡️

Target: Node.js

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: Python

Vulnerabilities (9)

Package Vulnerability ID Severity Installed Version Fixed Version
apache-airflow CVE-2025-68438 🚨 HIGH 3.1.5 3.1.6
apache-airflow CVE-2025-68675 🚨 HIGH 3.1.5 3.1.6, 2.11.1
cryptography CVE-2026-26007 🚨 HIGH 42.0.8 46.0.5
jaraco.context CVE-2026-23949 🚨 HIGH 6.0.1 6.1.0
starlette CVE-2025-62727 🚨 HIGH 0.48.0 0.49.1
urllib3 CVE-2025-66418 🚨 HIGH 1.26.20 2.6.0
urllib3 CVE-2025-66471 🚨 HIGH 1.26.20 2.6.0
urllib3 CVE-2026-21441 🚨 HIGH 1.26.20 2.6.3
wheel CVE-2026-24049 🚨 HIGH 0.45.1 0.46.2

🛡️ TRIVY SCAN RESULT 🛡️

Target: /etc/ssl/private/ssl-cert-snakeoil.key

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/extended_sample_data.yaml

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/lineage.yaml

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_data.json

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_data.yaml

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_data_aut.yaml

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_usage.json

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_usage.yaml

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /ingestion/pipelines/sample_usage_aut.yaml

No Vulnerabilities Found

@github-actions
Copy link
Copy Markdown
Contributor

🛡️ TRIVY SCAN RESULT 🛡️

Target: openmetadata-ingestion:trivy (debian 12.12)

Vulnerabilities (4)

Package Vulnerability ID Severity Installed Version Fixed Version
libpam-modules CVE-2025-6020 🚨 HIGH 1.5.2-6+deb12u1 1.5.2-6+deb12u2
libpam-modules-bin CVE-2025-6020 🚨 HIGH 1.5.2-6+deb12u1 1.5.2-6+deb12u2
libpam-runtime CVE-2025-6020 🚨 HIGH 1.5.2-6+deb12u1 1.5.2-6+deb12u2
libpam0g CVE-2025-6020 🚨 HIGH 1.5.2-6+deb12u1 1.5.2-6+deb12u2

🛡️ TRIVY SCAN RESULT 🛡️

Target: Java

Vulnerabilities (38)

Package Vulnerability ID Severity Installed Version Fixed Version
com.fasterxml.jackson.core:jackson-core CVE-2025-52999 🚨 HIGH 2.12.7 2.15.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.12.7 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-core CVE-2025-52999 🚨 HIGH 2.13.4 2.15.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.13.4 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.15.2 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-core GHSA-72hv-8253-57qq 🚨 HIGH 2.16.1 2.18.6, 2.21.1, 3.1.0
com.fasterxml.jackson.core:jackson-databind CVE-2022-42003 🚨 HIGH 2.12.7 2.12.7.1, 2.13.4.2
com.fasterxml.jackson.core:jackson-databind CVE-2022-42004 🚨 HIGH 2.12.7 2.12.7.1, 2.13.4
com.google.code.gson:gson CVE-2022-25647 🚨 HIGH 2.2.4 2.8.9
com.google.protobuf:protobuf-java CVE-2021-22569 🚨 HIGH 3.3.0 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2022-3509 🚨 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 🚨 HIGH 3.3.0 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 🚨 HIGH 3.3.0 3.25.5, 4.27.5, 4.28.2
com.google.protobuf:protobuf-java CVE-2021-22569 🚨 HIGH 3.7.1 3.16.1, 3.18.2, 3.19.2
com.google.protobuf:protobuf-java CVE-2022-3509 🚨 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2022-3510 🚨 HIGH 3.7.1 3.16.3, 3.19.6, 3.20.3, 3.21.7
com.google.protobuf:protobuf-java CVE-2024-7254 🚨 HIGH 3.7.1 3.25.5, 4.27.5, 4.28.2
com.nimbusds:nimbus-jose-jwt CVE-2023-52428 🚨 HIGH 9.8.1 9.37.2
com.squareup.okhttp3:okhttp CVE-2021-0341 🚨 HIGH 3.12.12 4.9.2
commons-beanutils:commons-beanutils CVE-2025-48734 🚨 HIGH 1.9.4 1.11.0
commons-io:commons-io CVE-2024-47554 🚨 HIGH 2.8.0 2.14.0
dnsjava:dnsjava CVE-2024-25638 🚨 HIGH 2.1.7 3.6.0
io.airlift:aircompressor CVE-2025-67721 🚨 HIGH 0.27 2.0.3
io.netty:netty-codec-http2 CVE-2025-55163 🚨 HIGH 4.1.96.Final 4.2.4.Final, 4.1.124.Final
io.netty:netty-codec-http2 GHSA-xpw8-rcwv-8f8p 🚨 HIGH 4.1.96.Final 4.1.100.Final
io.netty:netty-handler CVE-2025-24970 🚨 HIGH 4.1.96.Final 4.1.118.Final
net.minidev:json-smart CVE-2021-31684 🚨 HIGH 1.3.2 1.3.3, 2.4.4
net.minidev:json-smart CVE-2023-1370 🚨 HIGH 1.3.2 2.4.9
org.apache.avro:avro CVE-2024-47561 🔥 CRITICAL 1.7.7 1.11.4
org.apache.avro:avro CVE-2023-39410 🚨 HIGH 1.7.7 1.11.3
org.apache.derby:derby CVE-2022-46337 🔥 CRITICAL 10.14.2.0 10.14.3, 10.15.2.1, 10.16.1.2, 10.17.1.0
org.apache.ivy:ivy CVE-2022-46751 🚨 HIGH 2.5.1 2.5.2
org.apache.mesos:mesos CVE-2018-1330 🚨 HIGH 1.4.3 1.6.0
org.apache.thrift:libthrift CVE-2019-0205 🚨 HIGH 0.12.0 0.13.0
org.apache.thrift:libthrift CVE-2020-13949 🚨 HIGH 0.12.0 0.14.0
org.apache.zookeeper:zookeeper CVE-2023-44981 🔥 CRITICAL 3.6.3 3.7.2, 3.8.3, 3.9.1
org.eclipse.jetty:jetty-server CVE-2024-13009 🚨 HIGH 9.4.56.v20240826 9.4.57.v20241219
org.lz4:lz4-java CVE-2025-12183 🚨 HIGH 1.8.0 1.8.1

🛡️ TRIVY SCAN RESULT 🛡️

Target: Node.js

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: Python

Vulnerabilities (25)

Package Vulnerability ID Severity Installed Version Fixed Version
Authlib CVE-2026-28802 🚨 HIGH 1.6.6 1.6.7
PyJWT CVE-2026-32597 🚨 HIGH 2.10.1 2.12.0
Werkzeug CVE-2024-34069 🚨 HIGH 2.2.3 3.0.3
aiohttp CVE-2025-69223 🚨 HIGH 3.12.12 3.13.3
aiohttp CVE-2025-69223 🚨 HIGH 3.13.2 3.13.3
apache-airflow CVE-2025-68438 🚨 HIGH 3.1.5 3.1.6
apache-airflow CVE-2025-68675 🚨 HIGH 3.1.5 3.1.6, 2.11.1
apache-airflow-providers-http CVE-2025-69219 🚨 HIGH 5.6.0 6.0.0
azure-core CVE-2026-21226 🚨 HIGH 1.37.0 1.38.0
cryptography CVE-2026-26007 🚨 HIGH 42.0.8 46.0.5
google-cloud-aiplatform CVE-2026-2472 🚨 HIGH 1.130.0 1.131.0
google-cloud-aiplatform CVE-2026-2473 🚨 HIGH 1.130.0 1.133.0
jaraco.context CVE-2026-23949 🚨 HIGH 5.3.0 6.1.0
jaraco.context CVE-2026-23949 🚨 HIGH 6.0.1 6.1.0
protobuf CVE-2026-0994 🚨 HIGH 4.25.8 6.33.5, 5.29.6
pyasn1 CVE-2026-23490 🚨 HIGH 0.6.1 0.6.2
python-multipart CVE-2026-24486 🚨 HIGH 0.0.20 0.0.22
ray CVE-2025-62593 🔥 CRITICAL 2.47.1 2.52.0
starlette CVE-2025-62727 🚨 HIGH 0.48.0 0.49.1
tornado CVE-2026-31958 🚨 HIGH 6.5.3 6.5.5
urllib3 CVE-2025-66418 🚨 HIGH 1.26.20 2.6.0
urllib3 CVE-2025-66471 🚨 HIGH 1.26.20 2.6.0
urllib3 CVE-2026-21441 🚨 HIGH 1.26.20 2.6.3
wheel CVE-2026-24049 🚨 HIGH 0.45.1 0.46.2
wheel CVE-2026-24049 🚨 HIGH 0.45.1 0.46.2

🛡️ TRIVY SCAN RESULT 🛡️

Target: usr/bin/docker

Vulnerabilities (3)

Package Vulnerability ID Severity Installed Version Fixed Version
stdlib CVE-2025-68121 🔥 CRITICAL v1.25.5 1.24.13, 1.25.7, 1.26.0-rc.3
stdlib CVE-2025-61726 🚨 HIGH v1.25.5 1.24.12, 1.25.6
stdlib CVE-2025-61728 🚨 HIGH v1.25.5 1.24.12, 1.25.6

🛡️ TRIVY SCAN RESULT 🛡️

Target: /etc/ssl/private/ssl-cert-snakeoil.key

No Vulnerabilities Found

🛡️ TRIVY SCAN RESULT 🛡️

Target: /home/airflow/openmetadata-airflow-apis/openmetadata_managed_apis.egg-info/PKG-INFO

No Vulnerabilities Found

@sonarqubecloud
Copy link
Copy Markdown

@sonarqubecloud
Copy link
Copy Markdown

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

safe to test Add this label to run secure Github workflows on PRs UI UI specific issues

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants