Release Notes (1.5.3)
This document provides a comprehensive overview of the latest updates and security fixes in HPE Ezmeral Unified Analytics Software (version 1.5.3).
HPE Ezmeral Unified Analytics Software provides software foundations for enterprises to develop and deploy end-to-end data and advanced analytics solutions from data engineering to data science and machine learning across hybrid cloud infrastructures – delivered as a software-as-a-service model.
Version 1.5.3 of HPE Ezmeral Unified Analytics Software includes several security fixes across multiple components and the following updates:
- HPE Ezmeral Unified Analytics Software version 1.5.3 includes an updated upgrade bundle image. See Upgrade Bundle Images.
- You cannot automatically download the workload cluster upgrade bundle. You must use the manual procedure described in Download the Workload Cluster Upgrade Bundle.
- If HPE Ezmeral Unified Analytics Software 1.5.2 was
installed without enabling the Air Gap environment or the Air Gap registry URL is not
configured for your existing 1.5.2 setup (URL is an empty string), you must manually set the
Air Gap registry URL to marketplace.us1.greenlake-hpe.com/ezua/. To set the Air Gap registry
URL to marketplace.us1.greenlake-hpe.com/ezua/, run the following commands on the Kubernetes
master
node:
kubectl patch cm ezua-cluster-config -n ezua-system --type merge -p '{"data":{"airgap.registryUrl":"marketplace.us1.greenlake-hpe.com/ezua/"}}' kubectl patch ezac in-cluster -n ezaddon-system --type merge -p '{"spec":{"registryUrl":"marketplace.us1.greenlake-hpe.com/ezua/"}}' - HPE Ezmeral Unified Analytics Software version 1.5.3 does not support RHEL 8.10. For supported OS versions, see Operating System.
CVEs Resolved Across All Components by Severity
- Critical
-
- CVE-2007-4559
- CVE-2022-1996
- CVE-2022-32207
- CVE-2022-32221
- CVE-2022-37434
- CVE-2022-37454
- CVE-2022-48174
- CVE-2023-23914
- CVE-2023-24531
- CVE-2023-24538
- CVE-2023-24540
- CVE-2023-29402
- CVE-2023-29404
- CVE-2023-29405
- CVE-2023-34152
- CVE-2023-38545
- CVE-2023-45853
- CVE-2023-49210
- CVE-2023-5841
- CVE-2023-6879
- CVE-2024-24790
- CVE-2024-32002
- CVE-2024-37371
- CVE-2024-38428
- CVE-2024-39887
- CVE-2024-41110
- CVE-2024-45337
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-5171
- CVE-2024-52338
- CVE-2024-52533
- CVE-2024-53947
- CVE-2024-5535
- CVE-2024-56171
- CVE-2025-22871
- CVE-2025-3277
- CVE-2025-43859
- CVE-2025-4517
- CVE-2025-49794
- CVE-2025-49796
- CVE-2025-53014
- CVE-2025-57807
- CVE-2025-6965
- CVE-2025-7458
- High
-
- CVE-2011-10007
- CVE-2012-0039
- CVE-2015-20107
- CVE-2015-3276
- CVE-2016-7798
- CVE-2016-9113
- CVE-2016-9114
- CVE-2016-9580
- CVE-2016-9581
- CVE-2016-9917
- CVE-2016-9918
- CVE-2017-16232
- CVE-2017-17740
- CVE-2018-16376
- CVE-2018-25032
- CVE-2018-5709
- CVE-2018-6829
- CVE-2018-6951
- CVE-2018-6952
- CVE-2020-10735
- CVE-2020-15778
- CVE-2020-16156
- CVE-2020-36325
- CVE-2021-20311
- CVE-2021-28861
- CVE-2021-35331
- CVE-2021-3575
- CVE-2021-36690
- CVE-2022-0778
- CVE-2022-1292
- CVE-2022-1304
- CVE-2022-2068
- CVE-2022-22576
- CVE-2022-24975
- CVE-2022-26488
- CVE-2022-27191
- CVE-2022-27664
- CVE-2022-27775
- CVE-2022-27780
- CVE-2022-27781
- CVE-2022-27782
- CVE-2022-28131
- CVE-2022-28391
- CVE-2022-2879
- CVE-2022-2880
- CVE-2022-28948
- CVE-2022-30630
- CVE-2022-30631
- CVE-2022-30632
- CVE-2022-30633
- CVE-2022-30635
- CVE-2022-30636
- CVE-2022-32149
- CVE-2022-32189
- CVE-2022-3602
- CVE-2022-3786
- CVE-2022-3996
- CVE-2022-41715
- CVE-2022-41716
- CVE-2022-41720
- CVE-2022-41721
- CVE-2022-41722
- CVE-2022-41723
- CVE-2022-41724
- CVE-2022-41725
- CVE-2022-42915
- CVE-2022-43551
- CVE-2022-4450
- CVE-2022-45061
- CVE-2022-49043
- CVE-2023-0215
- CVE-2023-0216
- CVE-2023-0217
- CVE-2023-0286
- CVE-2023-0401
- CVE-2023-0464
- CVE-2023-24329
- CVE-2023-24534
- CVE-2023-24536
- CVE-2023-24537
- CVE-2023-24539
- CVE-2023-25193
- CVE-2023-25652
- CVE-2023-27533
- CVE-2023-27534
- CVE-2023-28319
- CVE-2023-29007
- CVE-2023-29400
- CVE-2023-29403
- CVE-2023-2953
- CVE-2023-31484
- CVE-2023-31486
- CVE-2023-33953
- CVE-2023-35945
- CVE-2023-36632
- CVE-2023-39323
- CVE-2023-39325
- CVE-2023-39616
- CVE-2023-44431
- CVE-2023-44487
- CVE-2023-45142
- CVE-2023-45283
- CVE-2023-45285
- CVE-2023-45287
- CVE-2023-47108
- CVE-2023-49462
- CVE-2023-49463
- CVE-2023-50387
- CVE-2023-50782
- CVE-2023-50868
- CVE-2023-51596
- CVE-2023-52355
- CVE-2023-52356
- CVE-2023-52425
- CVE-2023-5363
- CVE-2023-6597
- CVE-2023-7104
- CVE-2024-0397
- CVE-2024-0553
- CVE-2024-0567
- CVE-2024-10979
- CVE-2024-1135
- CVE-2024-12254
- CVE-2024-1394
- CVE-2024-2398
- CVE-2024-24557
- CVE-2024-24784
- CVE-2024-24786
- CVE-2024-24791
- CVE-2024-25062
- CVE-2024-25269
- CVE-2024-26130
- CVE-2024-26461
- CVE-2024-28757
- CVE-2024-32004
- CVE-2024-32465
- CVE-2024-34069
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-34459
- CVE-2024-3651
- CVE-2024-37370
- CVE-2024-37568
- CVE-2024-39689
- CVE-2024-4030
- CVE-2024-4032
- CVE-2024-40635
- CVE-2024-41311
- CVE-2024-4340
- CVE-2024-45490
- CVE-2024-4741
- CVE-2024-47874
- CVE-2024-49767
- CVE-2024-52304
- CVE-2024-53589
- CVE-2024-53981
- CVE-2024-55549
- CVE-2024-56201
- CVE-2024-56326
- CVE-2024-56406
- CVE-2024-6119
- CVE-2024-6232
- CVE-2024-6827
- CVE-2024-7006
- CVE-2024-7348
- CVE-2024-7592
- CVE-2024-8088
- CVE-2024-8176
- CVE-2024-8260
- CVE-2024-9287
- CVE-2025-0395
- CVE-2025-0725
- CVE-2025-0840
- CVE-2025-1094
- CVE-2025-11082
- CVE-2025-11083
- CVE-2025-1179
- CVE-2025-22868
- CVE-2025-22869
- CVE-2025-24855
- CVE-2025-24928
- CVE-2025-26519
- CVE-2025-27113
- CVE-2025-27363
- CVE-2025-27516
- CVE-2025-27614
- CVE-2025-27696
- CVE-2025-29070
- CVE-2025-29087
- CVE-2025-30204
- CVE-2025-31115
- CVE-2025-31498
- CVE-2025-32414
- CVE-2025-32415
- CVE-2025-32988
- CVE-2025-32990
- CVE-2025-4138
- CVE-2025-4330
- CVE-2025-4435
- CVE-2025-46334
- CVE-2025-46342
- CVE-2025-46569
- CVE-2025-4674
- CVE-2025-46835
- CVE-2025-47907
- CVE-2025-4802
- CVE-2025-48060
- CVE-2025-48384
- CVE-2025-48385
- CVE-2025-49795
- CVE-2025-5222
- CVE-2025-5244
- CVE-2025-5245
- CVE-2025-53101
- CVE-2025-53367
- CVE-2025-53643
- CVE-2025-5399
- CVE-2025-55154
- CVE-2025-55298
- CVE-2025-57803
- CVE-2025-59375
- CVE-2025-59420
- CVE-2025-6020
- CVE-2025-6021
- CVE-2025-61920
- CVE-2025-6297
- CVE-2025-7345
- CVE-2025-7424
- CVE-2025-7425
- CVE-2025-7545
- CVE-2025-7546
- CVE-2025-8176
- CVE-2025-8177
- CVE-2025-8714
- CVE-2025-8715
- CVE-2025-9086
- CVE-2025-9230
- CVE-2025-9900
- GHSA-459x-q9hg-4gpq
- Medium
-
- CVE-2005-0406
- CVE-2007-3996
- CVE-2009-3546
- CVE-2015-9019
- CVE-2016-10505
- CVE-2016-20012
- CVE-2016-2781
- CVE-2016-3189
- CVE-2016-8678
- CVE-2016-9115
- CVE-2016-9116
- CVE-2016-9117
- CVE-2016-9797
- CVE-2016-9798
- CVE-2016-9799
- CVE-2016-9800
- CVE-2016-9801
- CVE-2016-9802
- CVE-2016-9803
- CVE-2016-9804
- CVE-2017-11754
- CVE-2017-11755
- CVE-2017-13716
- CVE-2017-14159
- CVE-2017-14988
- CVE-2017-7275
- CVE-2017-7475
- CVE-2017-9937
- CVE-2018-1000021
- CVE-2018-10126
- CVE-2018-15607
- CVE-2018-15919
- CVE-2018-18064
- CVE-2018-20673
- CVE-2018-20712
- CVE-2018-9996
- CVE-2019-6110
- CVE-2019-6461
- CVE-2019-6462
- CVE-2019-6988
- CVE-2020-14145
- CVE-2020-15719
- CVE-2021-31879
- CVE-2021-32256
- CVE-2021-4160
- CVE-2021-4214
- CVE-2021-43979
- CVE-2021-45261
- CVE-2021-46310
- CVE-2021-46312
- CVE-2022-1210
- CVE-2022-1705
- CVE-2022-1962
- CVE-2022-2097
- CVE-2022-27774
- CVE-2022-27776
- CVE-2022-27943
- CVE-2022-32148
- CVE-2022-32205
- CVE-2022-32206
- CVE-2022-32208
- CVE-2022-41717
- CVE-2022-4203
- CVE-2022-4304
- CVE-2022-43552
- CVE-2023-0465
- CVE-2023-0466
- CVE-2023-1255
- CVE-2023-1916
- CVE-2023-1972
- CVE-2023-2253
- CVE-2023-23915
- CVE-2023-23916
- CVE-2023-24056
- CVE-2023-24532
- CVE-2023-25433
- CVE-2023-2650
- CVE-2023-26965
- CVE-2023-26966
- CVE-2023-27535
- CVE-2023-27538
- CVE-2023-28320
- CVE-2023-28321
- CVE-2023-2908
- CVE-2023-29406
- CVE-2023-29409
- CVE-2023-29483
- CVE-2023-29659
- CVE-2023-2975
- CVE-2023-3164
- CVE-2023-32570
- CVE-2023-32732
- CVE-2023-3446
- CVE-2023-3618
- CVE-2023-37769
- CVE-2023-3817
- CVE-2023-39318
- CVE-2023-39319
- CVE-2023-39326
- CVE-2023-39327
- CVE-2023-39328
- CVE-2023-39329
- CVE-2023-39615
- CVE-2023-3978
- CVE-2023-40217
- CVE-2023-4039
- CVE-2023-40403
- CVE-2023-42363
- CVE-2023-42364
- CVE-2023-42365
- CVE-2023-42366
- CVE-2023-45284
- CVE-2023-45288
- CVE-2023-45289
- CVE-2023-45290
- CVE-2023-45322
- CVE-2023-46218
- CVE-2023-4641
- CVE-2023-48795
- CVE-2023-49582
- CVE-2023-50495
- CVE-2023-51580
- CVE-2023-51589
- CVE-2023-51592
- CVE-2023-51594
- CVE-2023-52426
- CVE-2023-52969
- CVE-2023-52970
- CVE-2023-52971
- CVE-2023-5678
- CVE-2023-6129
- CVE-2023-6237
- CVE-2023-6277
- CVE-2023-7008
- CVE-2024-0450
- CVE-2024-0727
- CVE-2024-0853
- CVE-2024-10041
- CVE-2024-10524
- CVE-2024-10976
- CVE-2024-10978
- CVE-2024-12133
- CVE-2024-12243
- CVE-2024-12718
- CVE-2024-12797
- CVE-2024-13176
- CVE-2024-21096
- CVE-2024-2236
- CVE-2024-22365
- CVE-2024-23337
- CVE-2024-2379
- CVE-2024-2466
- CVE-2024-24783
- CVE-2024-24785
- CVE-2024-24787
- CVE-2024-24788
- CVE-2024-24789
- CVE-2024-2511
- CVE-2024-25260
- CVE-2024-25629
- CVE-2024-26458
- CVE-2024-26462
- CVE-2024-28180
- CVE-2024-28182
- CVE-2024-28219
- CVE-2024-28834
- CVE-2024-28835
- CVE-2024-3219
- CVE-2024-34064
- CVE-2024-34155
- CVE-2024-35195
- CVE-2024-38949
- CVE-2024-38950
- CVE-2024-4317
- CVE-2024-45336
- CVE-2024-45341
- CVE-2024-4603
- CVE-2024-46488
- CVE-2024-46901
- CVE-2024-47081
- CVE-2024-49766
- CVE-2024-50602
- CVE-2024-53948
- CVE-2024-53949
- CVE-2024-55633
- CVE-2024-5642
- CVE-2024-56826
- CVE-2024-56827
- CVE-2024-57360
- CVE-2024-6104
- CVE-2024-6874
- CVE-2024-6923
- CVE-2024-7246
- CVE-2024-7264
- CVE-2024-8096
- CVE-2024-9143
- CVE-2024-9355
- CVE-2024-9681
- CVE-2025-0913
- CVE-2025-0938
- CVE-2025-10911
- CVE-2025-11081
- CVE-2025-11412
- CVE-2025-11413
- CVE-2025-11414
- CVE-2025-1147
- CVE-2025-11494
- CVE-2025-11495
- CVE-2025-1153
- CVE-2025-1176
- CVE-2025-1178
- CVE-2025-1181
- CVE-2025-1182
- CVE-2025-11839
- CVE-2025-1352
- CVE-2025-1365
- CVE-2025-1372
- CVE-2025-1390
- CVE-2025-21490
- CVE-2025-22866
- CVE-2025-22870
- CVE-2025-22872
- CVE-2025-2361
- CVE-2025-26465
- CVE-2025-27587
- CVE-2025-29088
- CVE-2025-30258
- CVE-2025-30693
- CVE-2025-30722
- CVE-2025-3198
- CVE-2025-32988
- CVE-2025-32989
- CVE-2025-32990
- CVE-2025-3576
- CVE-2025-40909
- CVE-2025-4207
- CVE-2025-4373
- CVE-2025-4516
- CVE-2025-4565
- CVE-2025-4575
- CVE-2025-4598
- CVE-2025-4673
- CVE-2025-47906
- CVE-2025-48074
- CVE-2025-48386
- CVE-2025-48912
- CVE-2025-4947
- CVE-2025-50181
- CVE-2025-50182
- CVE-2025-5025
- CVE-2025-50952
- CVE-2025-5318
- CVE-2025-54121
- CVE-2025-54410
- CVE-2025-55160
- CVE-2025-55672
- CVE-2025-55673
- CVE-2025-55674
- CVE-2025-55675
- CVE-2025-62171
- CVE-2025-62706
- CVE-2025-6395
- CVE-2025-8058
- CVE-2025-8224
- CVE-2025-8851
- CVE-2025-9231
- CVE-2025-9232
- CVE-2025-9714
- Low
-
- CVE-2007-2243
- CVE-2007-2768
- CVE-2007-3476
- CVE-2007-3477
- CVE-2008-1687
- CVE-2008-1688
- CVE-2008-3134
- CVE-2008-3234
- CVE-2010-4651
- CVE-2011-3389
- CVE-2021-36084
- CVE-2021-36085
- CVE-2021-36086
- CVE-2021-36087
- CVE-2021-4217
- CVE-2022-3219
- CVE-2022-35252
- CVE-2023-25815
- CVE-2023-28322
- CVE-2023-29383
- CVE-2023-38546
- CVE-2023-4016
- CVE-2023-51792
- CVE-2023-6228
- CVE-2024-10977
- CVE-2024-11053
- CVE-2024-11168
- CVE-2024-13978
- CVE-2024-2004
- CVE-2024-31047
- CVE-2024-32020
- CVE-2024-32021
- CVE-2024-48921
- CVE-2024-50349
- CVE-2024-51744
- CVE-2024-52005
- CVE-2024-52006
- CVE-2025-0167
- CVE-2025-1148
- CVE-2025-1149
- CVE-2025-1150
- CVE-2025-1151
- CVE-2025-1152
- CVE-2025-11731
- CVE-2025-1180
- CVE-2025-11840
- CVE-2025-1371
- CVE-2025-1376
- CVE-2025-1377
- CVE-2025-1795
- CVE-2025-27613
- CVE-2025-32728
- CVE-2025-3360
- CVE-2025-43965
- CVE-2025-46394
- CVE-2025-50422
- CVE-2025-53019
- CVE-2025-55212
- CVE-2025-6170
- CVE-2025-61984
- CVE-2025-61985
- CVE-2025-6199
- CVE-2025-7039
- CVE-2025-8225
- CVE-2025-8534
- CVE-2025-8713
- CVE-2025-8732
- CVE-2025-8961
- CVE-2025-9165
- Unspecified
-
- CVE-2015-2104
- CVE-2025-24528
Superset
- Critical CVEs
-
- CVE-2007-4559
- CVE-2022-37454
- CVE-2023-24531
- CVE-2023-29402
- CVE-2023-29404
- CVE-2023-29405
- CVE-2024-24790
- CVE-2024-32002
- CVE-2024-37371
- CVE-2024-39887
- CVE-2024-45337
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-53947
- CVE-2024-5535
- CVE-2024-56171
- CVE-2025-22871
- CVE-2025-4517
- CVE-2025-49794
- CVE-2025-49796
- CVE-2025-6965
- High CVEs
-
- CVE-2007-4559
- CVE-2022-37454
- CVE-2023-24531
- CVE-2023-29402
- CVE-2023-29404
- CVE-2023-29405
- CVE-2024-24790
- CVE-2024-32002
- CVE-2024-37371
- CVE-2024-39887
- CVE-2024-45337
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-53947
- CVE-2024-5535
- CVE-2024-56171
- CVE-2025-22871
- CVE-2025-4517
- CVE-2025-49794
- CVE-2025-49796
- CVE-2025-6965
Monitoring
- Critical CVEs
-
- CVE-2022-32207
- CVE-2022-32221
- CVE-2022-37434
- CVE-2022-48174
- CVE-2023-23914
- CVE-2023-38545
- CVE-2023-49210
- CVE-2024-5535
- High CVEs
-
- CVE-2016-7798
- CVE-2018-25032
- CVE-2022-0778
- CVE-2022-1292
- CVE-2022-2068
- CVE-2022-22576
- CVE-2022-27775
- CVE-2022-27780
- CVE-2022-27781
- CVE-2022-27782
- CVE-2022-28391
- CVE-2022-3602
- CVE-2022-3786
- CVE-2022-3996
- CVE-2022-42915
- CVE-2022-43551
- CVE-2022-4450
- CVE-2023-0215
- CVE-2023-0216
- CVE-2023-0217
- CVE-2023-0286
- CVE-2023-0401
- CVE-2023-0464
- CVE-2023-27533
- CVE-2023-27534
- CVE-2023-28319
- CVE-2023-35945
- CVE-2023-5363
- CVE-2024-1394
- CVE-2024-2398
- CVE-2024-4741
- CVE-2024-6119
- CVE-2025-0725
- CVE-2025-26519
- CVE-2025-9086
MLflow
- Critical CVEs
-
- CVE-2024-24790
- CVE-2024-37371
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-5535
- CVE-2025-22871
- CVE-2025-3277
- CVE-2025-43859
- High CVEs
-
- CVE-2020-16156
- CVE-2021-36690
- CVE-2022-1304
- CVE-2023-50387
- CVE-2023-50782
- CVE-2023-50868
- CVE-2023-52425
- CVE-2023-7104
- CVE-2024-0553
- CVE-2024-0567
- CVE-2024-10979
- CVE-2024-12254
- CVE-2024-2398
- CVE-2024-24784
- CVE-2024-24791
- CVE-2024-26130
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-37370
- CVE-2024-39689
- CVE-2024-45490
- CVE-2024-4741
- CVE-2024-47874
- CVE-2024-52304
- CVE-2024-53981
- CVE-2024-6119
- CVE-2024-7348
- CVE-2025-1094
- CVE-2025-26519
- CVE-2025-29087
- CVE-2025-31498
- CVE-2025-4674
- CVE-2025-47907
- CVE-2025-53643
- CVE-2025-5399
- CVE-2025-8714
- CVE-2025-8715
Feast
- Critical CVEs
-
- CVE-2023-34152
- CVE-2023-45853
- CVE-2023-5841
- CVE-2023-6879
- CVE-2024-24790
- CVE-2024-32002
- CVE-2024-37371
- CVE-2024-38428
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-5171
- CVE-2024-52338
- CVE-2024-52533
- CVE-2024-5535
- CVE-2024-56171
- CVE-2025-22871
- CVE-2025-43859
- CVE-2025-49794
- CVE-2025-49796
- CVE-2025-53014
- CVE-2025-57807
- CVE-2025-6965
- CVE-2025-7458
- High CVEs
-
- CVE-2012-0039
- CVE-2015-3276
- CVE-2016-9113
- CVE-2016-9114
- CVE-2016-9580
- CVE-2016-9581
- CVE-2016-9917
- CVE-2016-9918
- CVE-2017-16232
- CVE-2017-17740
- CVE-2018-16376
- CVE-2018-5709
- CVE-2018-6829
- CVE-2018-6951
- CVE-2018-6952
- CVE-2020-15778
- CVE-2020-36325
- CVE-2021-20311
- CVE-2021-35331
- CVE-2021-3575
- CVE-2022-24975
- CVE-2022-49043
- CVE-2023-25193
- CVE-2023-25652
- CVE-2023-29007
- CVE-2023-2953
- CVE-2023-31484
- CVE-2023-31486
- CVE-2023-39616
- CVE-2023-44431
- CVE-2023-49462
- CVE-2023-49463
- CVE-2023-51596
- CVE-2023-52355
- CVE-2023-52356
- CVE-2023-52425
- CVE-2023-7104
- CVE-2024-0397
- CVE-2024-10979
- CVE-2024-2398
- CVE-2024-24784
- CVE-2024-24791
- CVE-2024-25062
- CVE-2024-25269
- CVE-2024-26461
- CVE-2024-28757
- CVE-2024-32004
- CVE-2024-32465
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-34459
- CVE-2024-37370
- CVE-2024-39689
- CVE-2024-4032
- CVE-2024-41311
- CVE-2024-45490
- CVE-2024-4741
- CVE-2024-47874
- CVE-2024-53589
- CVE-2024-53981
- CVE-2024-55549
- CVE-2024-56201
- CVE-2024-56326
- CVE-2024-56406
- CVE-2024-6119
- CVE-2024-6232
- CVE-2024-7006
- CVE-2024-7348
- CVE-2024-7592
- CVE-2024-8088
- CVE-2024-8176
- CVE-2024-9287
- CVE-2025-0395
- CVE-2025-0725
- CVE-2025-0840
- CVE-2025-1094
- CVE-2025-11082
- CVE-2025-11083
- CVE-2025-1179
- CVE-2025-24855
- CVE-2025-24928
- CVE-2025-26519
- CVE-2025-27113
- CVE-2025-27363
- CVE-2025-27516
- CVE-2025-29070
- CVE-2025-31115
- CVE-2025-31498
- CVE-2025-32414
- CVE-2025-32415
- CVE-2025-32988
- CVE-2025-32990
- CVE-2025-4674
- CVE-2025-46835
- CVE-2025-47907
- CVE-2025-4802
- CVE-2025-48060
- CVE-2025-48384
- CVE-2025-48385
- CVE-2025-5222
- CVE-2025-5244
- CVE-2025-5245
- CVE-2025-53101
- CVE-2025-53367
- CVE-2025-5399
- CVE-2025-55154
- CVE-2025-55298
- CVE-2025-57803
- CVE-2025-59375
- CVE-2025-6020
- CVE-2025-6021
- CVE-2025-6297
- CVE-2025-7345
- CVE-2025-7424
- CVE-2025-7425
- CVE-2025-7545
- CVE-2025-7546
- CVE-2025-8176
- CVE-2025-8177
- CVE-2025-8714
- CVE-2025-8715
- CVE-2025-9900
EzLicense
- Critical CVEs
-
- CVE-2024-24790
- CVE-2024-45337
- CVE-2025-22871
- High CVEs
-
- CVE-2023-44487
- CVE-2023-47108
- CVE-2024-24784
- CVE-2024-24786
- CVE-2024-24791
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-8260
- CVE-2025-22868
- CVE-2025-22869
- CVE-2025-30204
- CVE-2025-46342
- CVE-2025-46569
- CVE-2025-4674
- CVE-2025-47907
- CVE-2025-9230
- GHSA-459x-q9hg-4gpq
EzBillingCollector
- High CVEs
-
- CVE-2025-30204
EzApp
- Critical CVEs
-
- CVE-2022-1996
- CVE-2023-24531
- CVE-2023-24538
- CVE-2023-24540
- CVE-2023-29402
- CVE-2023-29404
- CVE-2023-29405
- CVE-2024-24790
- CVE-2024-32002
- CVE-2024-38428
- CVE-2024-41110
- CVE-2024-45337
- CVE-2024-45491
- CVE-2024-45492
- CVE-2024-5535
- CVE-2024-56171
- CVE-2025-22871
- CVE-2025-49794
- CVE-2025-49796
- High CVEs
-
- CVE-2011-10007
- CVE-2022-27191
- CVE-2022-27664
- CVE-2022-28131
- CVE-2022-2879
- CVE-2022-2880
- CVE-2022-28948
- CVE-2022-30630
- CVE-2022-30631
- CVE-2022-30632
- CVE-2022-30633
- CVE-2022-30635
- CVE-2022-30636
- CVE-2022-32149
- CVE-2022-32189
- CVE-2022-41715
- CVE-2022-41716
- CVE-2022-41720
- CVE-2022-41721
- CVE-2022-41722
- CVE-2022-41723
- CVE-2022-41724
- CVE-2022-41725
- CVE-2022-49043
- CVE-2023-24534
- CVE-2023-24536
- CVE-2023-24537
- CVE-2023-24539
- CVE-2023-25652
- CVE-2023-29007
- CVE-2023-29400
- CVE-2023-29403
- CVE-2023-33953
- CVE-2023-39323
- CVE-2023-39325
- CVE-2023-44487
- CVE-2023-45142
- CVE-2023-45283
- CVE-2023-45285
- CVE-2023-45287
- CVE-2023-47108
- CVE-2023-52425
- CVE-2024-2398
- CVE-2024-24557
- CVE-2024-24784
- CVE-2024-24786
- CVE-2024-24791
- CVE-2024-25062
- CVE-2024-32004
- CVE-2024-32465
- CVE-2024-34156
- CVE-2024-34158
- CVE-2024-34459
- CVE-2024-40635
- CVE-2024-45490
- CVE-2024-4741
- CVE-2024-56406
- CVE-2024-6119
- CVE-2024-8176
- CVE-2025-0395
- CVE-2025-22868
- CVE-2025-22869
- CVE-2025-24928
- CVE-2025-26519
- CVE-2025-27113
- CVE-2025-27614
- CVE-2025-31115
- CVE-2025-31498
- CVE-2025-32414
- CVE-2025-32415
- CVE-2025-32988
- CVE-2025-32990
- CVE-2025-46334
- CVE-2025-4674
- CVE-2025-47907
- CVE-2025-4802
- CVE-2025-48060
- CVE-2025-49795
- CVE-2025-5222
- CVE-2025-5399
- CVE-2025-6021
- CVE-2025-7425
- CVE-2025-9230
Known Issues
- Cannot set Git-Sync container limits through the UI
- Airflow DAGs use a sidecar container for Git-Sync. The sidecar container consumes
resources for every DAG run. You cannot limit the resources allocated to the container
through the HPE Ezmeral Unified Analytics Software UI.
Workaround
If you have kubectl access to the master node, you can change the git-sync setting in the AirflowCluster CR. If you complete the following steps to change the CR, the Airflow cluster operator will not update the statefulset anymore. For example, if the git repo changes, you will need to update the env in the statefulset manually unless you delete the statefulset.- Stop the Airflow operator statefulset in the
airflow-hpenamespace (scale to 0).kubectl scale sts -n airflowop-system airflowop-controller-manager --replicas=0 - Edit the UI statefulset and remove all labels and ownerReferences. This blocks
the operator so it can be udpated. NOTEBack up the sts before making any changes.
kubectl edit sts -n airflow-hpe af-cluster-airflowui //Remove labels: labels: custom-resource: v1alpha1.AirflowCluster //Remove ownerReferences: ownerReferences: - apiVersion: airflow.hpe.com/v1alpha1 blockOwnerDeletion: true controller: true kind: '*v1alpha1.AirflowCluster' name: af-cluster uid: 5e13d8db-6d69-4460-9e42-346c230a3c9e - Edit the git-sync resource settings.
apiVersion: apps/v1 kind: StatefulSet ~~~ name: airflow-ui resources: limits: cpu: 1160m memory: 3080Mi requests: cpu: 320m memory: 1640Mi ~~~ name: git-sync ports: - containerPort: 2020 name: gitsync protocol: TCP resources: limits: cpu: 400m memory: 800Mi requests: cpu: 80m memory: 410Mi - Verify the pod status in the
airflow-hpenamespace.kubectl get pod af-cluster-airflowui-0 -n airflow-hpe -o jsonpath="{range .spec.containers[*]}Name: {.name}, Requests: CPU={.resources.requests.cpu}, Memory={.resources.requests.memory}, Limits: CPU={.resources.limits.cpu}, Memory={.resources.limits.memory}{'\n'}" - Scale up the operator
statefulset.
kubectl scale sts -n airflowop-system airflowop-controller-manager --replicas=1
NOTEIf you want the operator to automatically update the statefulset in the future, delete the statefulset. Once deleted, the operator recreates it automatically.kubectl delete sts -n airflow-hpe af-cluster-airflowui //Run the following commands to verify that sts is running and verify resource allocations: kubectl get sts,po -n airflow-hpe |grep airflowui kubectl get pod af-cluster-airflowui-0 -n airflow-hpe -o jsonpath="{range .spec.containers[*]}Name: {.name}, Requests: CPU={.resources.requests.cpu}, Memory={.resources.requests.memory}, Limits: CPU={.resources.limits.cpu}, Memory={.resources.limits.memory}{'\n'}" - Stop the Airflow operator statefulset in the
Additional Resources
- Documentation
- Release note archives:
Thank you for choosing HPE Ezmeral Unified Analytics Software. Enjoy the new features and improvements introduced in this release.