In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Chainguard
trivy-fips
to version 0.58.0-r2 or higher.
Note: Versions mentioned in the description apply only to the upstream trivy-fips
package and not the trivy-fips
package as distributed by Chainguard
.
See How to fix?
for Chainguard
relevant fixed versions and status.
An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.