Skip to content

Trivy scan security vulnerabilities

During the Trivy check of the unit-service-v0-27-0:latest docker image we found some security vulnerabilities:

Vulnerability ID Affected libs Severity Description Link Source
CVE-2024-45491 libexpat 2.6.2-r0 CRITICAL An issue was discovered in libexpat before 2.6.3. dtdCopy in xmlparse.c can have an integer overflow for nDefaultAtts on 32-bit platforms (where UINT_MAX equals SIZE_MAX) https://avd.aquasec.com/nvd/2024/cve-2024-45491/ alpine 3.17.7
CVE-2024-45492 libexpat 2.6.2-r0 CRITICAL An issue was discovered in libexpat before 2.6.3. nextScaffoldPart in xmlparse.c can have an integer overflow for m_groupSize on 32-bit platforms (where UINT_MAX equals SIZE_MAX) https://avd.aquasec.com/nvd/2024/cve-2024-45492/ alpine 3.17.7
CVE-2024-38821 org.springframework.security:spring-security-web (app.jar) CRITICAL Spring-WebFlux: Authorization Bypass of Static Resources in WebFlux Applications https://avd.aquasec.com/nvd/2024/cve-2024-38821/ Java (jar)
CVE-2024-6197 curl,libcurl 8.7.1-r0 HIGH libcurl's ASN1 parser has this utf8asn1str() function used for parsing an ASN.1 UTF-8 string. Itcan detect an invalid field and return error. https://avd.aquasec.com/nvd/2024/cve-2024-6197/ alpine 3.17.7
CVE-2024-45490 libexpat 2.6.2-r0 HIGH An issue was discovered in libexpat before 2.6.3. xmlparse.c does not reject a negative length for XML_ParseBuffer https://avd.aquasec.com/nvd/2024/cve-2024-45490/ alpine 3.17.7
CVE-2023-52428 com.nimbusds:nimbus-jose-jwt 8.2 HIGH nimbus-jose-jwt: large JWE p2c header value causes Denial of service https://avd.aquasec.com/nvd/2023/cve-2023-52428/ Java (jar)
CVE-2024-38816 org.springframework:spring-webmvc 6.1.10 (app.jar) HIGH spring-webmvc: Path Traversal Vulnerability in Spring Applications Using RouterFunctions and FileSystemResource https://avd.aquasec.com/nvd/2024/cve-2024-38816/ Java (jar)
Edited by Oleksandr Stetskiv-SLB