-
Couldn't load subscription status.
- Fork 135
Open
Description
A recent security scan of the container image registry.access.redhat.com/ubi9/ubi:9.4 has identified multiple vulnerabilities with varying severity levels. The scan was conducted using Trivy Version: 0.60.0, and the advisories were last updated on 2025-03-25.
Summary of Findings:
-
Total Vulnerabilities Detected: 134
-
High Severity Vulnerabilities: 2
- CVE-2024-12797 - Vulnerability in
opensslrelated to raw public keys leading to potential man-in-the-middle attacks. - CVE-2024-56171 - Use-after-free vulnerability in
libxml2that may lead to exploitation through crafted XML documents.
- CVE-2024-12797 - Vulnerability in
-
Medium Severity Vulnerabilities: 16
- CVE-2025-0395 - Buffer overflow in
glibcwhen the assert function fails, potentially leading to application crashes. - CVE-2021-3997 - Uncontrolled recursion in
systemdleading to denial of service at boot time. - CVE-2024-10041 - Vulnerability in PAM allowing potential password leaks.
- CVE-2024-52533 - Buffer overflow in
glib2due to off-by-one error. - CVE-2024-50602 - Crash in
libexpatdue to improper parser handling.
- CVE-2025-0395 - Buffer overflow in
-
Low Severity Vulnerabilities: 116
- CVE-2022-41409 - Integer overflow vulnerability in
pcre2allowing denial of service. - CVE-2023-4156 - Heap out-of-bounds read flaw in
gawk. - CVE-2022-47007 - Memory leak in
gdb-gdbserver.
- CVE-2022-41409 - Integer overflow vulnerability in
Action Required:
- Review the vulnerabilities listed in the scan report(especially High vulnerabilities).
- Assess the impact on the application and determine necessary remediation steps.
- Consider updating or patching affected packages to mitigate risks.
Attachments:
- Full Report can be found here
Priority: High
Please address this issue promptly to ensure the security and integrity of the application.
Metadata
Metadata
Assignees
Labels
No labels