You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 14, 2024. It is now read-only.
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
-- | -- | -- | -- | -- | --
What you expected to happen:
User updated certifi to 2023.07.22. Repo was rescanned and vulnerability alert still exisits.
How to reproduce it (as minimally and precisely as possible):
Scan GitHUb repo for Code Exchange and set certifi version to 2023.7.22 or 2023.07.22
Thank you for your contribution! This issue has been automatically marked as stale because it has no recent activity in the last 60 days. It will be closed in 14 days, if no further activity occurs. If this issue is still relevant, please leave a comment to let us know, and the stale label will be automatically removed.
What happened:
In Cisco Code Exchange, the following vulnerability was found.
certifi | 2023.7.22 | 2023.07.22 | requirements.txt | GHSA-xqr8-7jwr-rhp7 |
Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi prior to version 2023.07.22 recognizes "e-Tugra" root certificates. e-Tugra's root certificates were subject to an investigation prompted by reporting of security issues in their systems. Certifi 2023.07.22 removes root certificates from "e-Tugra" from the root store.
-- | -- | -- | -- | -- | --
What you expected to happen:
User updated certifi to 2023.07.22. Repo was rescanned and vulnerability alert still exisits.
How to reproduce it (as minimally and precisely as possible):
Scan GitHUb repo for Code Exchange and set certifi version to 2023.7.22 or 2023.07.22
Are there any error messages in KubeClarity logs?
(e.g.
kubectl logs -n kubeclarity --selector=app=kubeclarity
)Unknown
Anything else we need to know?:
Environment:
kubectl version --short
):helm version
):kubectl -n kubeclarity exec deploy/kubeclarity -- ./backend version
)helm -n kubeclarity list
)The text was updated successfully, but these errors were encountered: