Security Alert: 5 HIGH-Severity Vulnerabilities Found in 'news-feed' Container Image
A Trivy security scan has flagged five HIGH-severity vulnerabilities within a critical container image, exposing a potential attack surface for denial-of-service, arbitrary code execution, and information disclosure. The scan, conducted on April 2, 2026, found zero critical issues but a concentrated cluster of high-risk flaws in core system libraries, indicating a container built on outdated and vulnerable dependencies.
The target is the Docker image `7002370412/news-feed:latest`, which uses Alpine Linux 3.23.3 as its base. The vulnerabilities are rooted in two key packages: `gnutls` and `libpng`. The gnutls library (version 3.8.11) is susceptible to a remote denial-of-service attack via a crafted ClientHello message. More critically, the installed version of libpng (1.6.54) harbors three distinct HIGH-severity flaws, including a heap buffer overflow, a use-after-free vulnerability allowing arbitrary code execution, and an information disclosure issue.
Each vulnerability has a fixed version available (gnutls 3.8.12, libpng 1.6.55/1.6.56), meaning the risk is currently unmitigated but patchable. The presence of multiple high-severity flaws in fundamental libraries like libpng, used for image processing, creates a compounded security risk for any service running this container. This pattern suggests the build pipeline may lack robust dependency management or automated patching, leaving the 'news-feed' application and its data flow exposed to potential exploitation until the base image is updated.