The base image is triggering the following critical CVEs on AWS ECR:
CVE-2022-40674 (expat):
libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
CVE-2022-32207 (libcurl, curl):
When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally widen the permissions for the target file, leaving the updated file accessible to more users than intended.
Hi,
The base image is triggering the following critical CVEs on AWS ECR:
CVE-2022-40674 (expat): libexpat before 2.4.9 has a use-after-free in the doContent function in xmlparse.c.
CVE-2022-32207 (libcurl, curl): When curl < 7.84.0 saves cookies, alt-svc and hsts data to local files, it makes the operation atomic by finalizing the operation with a rename from a temporary name to the final target file name.In that rename operation, it might accidentally widen the permissions for the target file, leaving the updated file accessible to more users than intended.