This document tracks security vulnerabilities in the WSI Slides Processor Docker image and the actions taken to address them.
| CVE ID | Severity | Score | Package | Fix Applied |
|---|---|---|---|---|
| CVE-2025-49794 | CRITICAL | 9.1 | libxml2 | Upgraded via apt-get |
| CVE-2025-49796 | CRITICAL | 9.1 | libxml2 | Upgraded via apt-get |
| CVE-2022-49043 | HIGH | 8.1 | libxml2 | Upgraded via apt-get |
| CVE-2023-31484 | HIGH | 8.1 | perl | Upgraded via apt-get |
| CVE-2024-56171 | HIGH | 7.8 | libxml2 | Upgraded via apt-get |
| CVE-2025-24928 | HIGH | 7.8 | libxml2 | Upgraded via apt-get |
| CVE-2025-49180 | HIGH | 7.8 | xorg-server | Upgraded via apt-get |
| CVE-2025-4802 | HIGH | 7.8 | glibc | Upgraded via apt-get |
| CVE-2024-25062 | HIGH | 7.5 | libxml2 | Upgraded via apt-get |
| CVE ID | Severity | Score | Package | Status | Action Required |
|---|---|---|---|---|---|
| CVE-2025-22871 | CRITICAL | 9.1 | golang stdlib 1.23.1 | Fixed in Go 1.23.8 | Wait for Microsoft base image update |
Details:
- Issue: Request smuggling vulnerability in
net/httppackage - Fix Available: Go 1.23.8
- Current Base Image: Uses Go 1.23.1 (embedded in Azure Functions runtime)
- Mitigation: Upgraded to Python 3.13 base image (latest available)
- Monitoring: Check mcr.microsoft.com/azure-functions/python weekly
- Current:
mcr.microsoft.com/azure-functions/python:4-python3.12 - Status: Latest stable version available (Python 3.13+ only available in
-appservicevariant) - Reason: Most recent security patches for standard Azure Functions runtime
Added explicit installation of vulnerable packages to ensure latest versions:
apt-get install -y --no-install-recommends \
libxml2 \
libc6 \
libc-bin \
perl-base \
xserver-common- Combined RUN commands to reduce layers
- Added
--no-cache-dirto pip for smaller image size - Removed build dependencies after use
- Added comprehensive
.dockerignore
-
Check for base image updates:
docker pull mcr.microsoft.com/azure-functions/python:4-python3.13 docker image inspect mcr.microsoft.com/azure-functions/python:4-python3.13
-
Rebuild the image:
docker build -t wsi-slides-processor:latest . -
Scan for vulnerabilities:
# Using Docker Scout docker scout cves wsi-slides-processor:latest # Or using Trivy trivy image wsi-slides-processor:latest
- Review CVE databases for new vulnerabilities
- Update this document with new findings
- Test application compatibility with latest base images
- Docker Scout: Built into Docker Desktop
- Trivy: Open-source vulnerability scanner
- Snyk: Commercial solution with free tier
- Azure Defender for Containers: If deploying to Azure
Docker Scout:
docker scout cves wsi-slides-processor:latest --only-severity critical,highTrivy:
trivy image --severity CRITICAL,HIGH wsi-slides-processor:latestIf a new critical vulnerability is discovered:
- Assess Impact: Determine if the vulnerability affects your deployment
- Check for Fixes: Look for updated packages or base images
- Test Updates: Build and test with updated dependencies
- Deploy: Roll out the patched image
- Document: Update this file with the CVE and resolution
For security concerns, contact: [Your Security Team Email]
Note: This is a living document. Update it whenever security changes are made to the Docker image.