Third-Party Package Updates in Splunk/UniversalForwarder Docker - April 2025

Advisory ID: SVD-2025-0402

CVE ID:  Multiple

Published: 2025-04-02

Last Update: 2025-04-02

Description

Splunk remedied common vulnerabilities and exposures (CVEs) in Third Party Packages in the “splunk/universalforwarder“ Docker image with image tags “9.4.1“, “9.3.3“, “9.2.5“, “9.1.8“, and “latest“. Docker images with tags “9.4“, “9.3“, “9.2“, or “9.1“, also include these fixes. Third Party packages remedied includes the following:

PackageRemediationCVESeverity
Jinja21Upgraded to 3.1.5CVE-2024-56201 and CVE-2024-56326Medium
requests2Upgraded to 2.32.3CVE-2024-35195Medium

1 Upgrade jinja2 at usr/lib/python3.9/site-packages/jinja2 to 3.1.5

2 Upgrade the requests at /usr/lib/python3.9/site-packages/requests to 2.32.3. Note, tag 9.4.0 includes the updated package.

Solution

Upgrade your splunk/universalforwarder Docker image to the most up-to-date version using the Docker image with tag “latest“.

Depending on the version of your image or container, you can also upgrade using images with tags “9.4.1“, “9.3.3“, “9.2.5“, or 9.1.8“ or higher, or, alternatively, with tags “9.4“, “9.3“, “9.2“, or “9.1“ or higher.

Product Status

ProductVersionComponentAffected VersionFix Version
splunk/universalforwarder9.49.4.09.4.1
splunk/universalforwarder9.39.3.0 to 9.3.29.3.3
splunk/universalforwarder9.29.2.0 to 9.2.49.2.5
splunk/universalforwarder9.19.1.0 to 9.1.79.1.8

Severity

For the CVEs in this list, Splunk adopted the severity rating that the vendor published.