Skip to main content
New to Testkube? Unleash the power of cloud native testing in Kubernetes with Testkube. Get Started >

nats-server-config-reloader-0.16.0_linux_amd64

digestsha256:6e1f185d0f39fdf6032872bd20f1ce134d4e18c923d55f7cf93d40afcf6a8ffe
vulnerabilitiescritical: 0 high: 1 medium: 6 low: 0
platformlinux/amd64
size4.8 MB
packages22
critical: 0 high: 1 medium: 0 low: 0 musl 1.2.5-r0 (apk)

pkg:apk/alpine/musl@1.2.5-r0?os_name=alpine&os_version=3.20

# Dockerfile (4:31)
FROM alpine:3.20.3 as deps

ARG GO_APP
ARG GORELEASER_DIST_DIR=/go/src/dist

ARG TARGETOS
ARG TARGETARCH
ARG TARGETVARIANT

RUN mkdir -p /go/bin /go/src ${GORELEASER_DIST_DIR}

COPY --from=build ${GORELEASER_DIST_DIR}/ ${GORELEASER_DIST_DIR}

RUN <<EOT
set -e
apk add --no-cache ca-certificates jq
cd ${GORELEASER_DIST_DIR}/..

if [[ ${TARGETARCH} == "arm" ]]; then VARIANT=$(echo ${TARGETVARIANT} | sed 's/^v//'); fi
BIN_PATH=$(jq -r ".[] |select(.type == \"Binary\" and \
.name == \"${GO_APP}\" and \
.goos == \"${TARGETOS}\" and \
.goarch == \"${TARGETARCH}\" and \
(.goarm == \"${VARIANT}\" or .goarm == null)) | .path" < /go/src/dist/artifacts.json)
cp ${BIN_PATH} /go/bin
EOT

FROM alpine:3.20.3

high : CVE--2025--26519

Affected range<1.2.5-r1
Fixed version1.2.5-r1
EPSS Score0.045%
EPSS Percentile18th percentile
Description
critical: 0 high: 0 medium: 3 low: 0 stdlib 1.23.1 (golang)

pkg:golang/stdlib@1.23.1

# Dockerfile (38:38)
COPY --from=deps /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/

medium : CVE--2024--45341

Affected range
>=1.23.0-0
<1.23.5
Fixed version1.23.5
EPSS Score0.045%
EPSS Percentile18th percentile
Description

A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain.

Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.

medium : CVE--2024--45336

Affected range
>=1.23.0-0
<1.23.5
Fixed version1.23.5
EPSS Score0.045%
EPSS Percentile18th percentile
Description

The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com.

In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.

medium : CVE--2025--22866

Affected range
>=1.23.0-0
<1.23.6
Fixed version1.23.6
EPSS Score0.045%
EPSS Percentile18th percentile
Description

Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.

critical: 0 high: 0 medium: 3 low: 0 openssl 3.3.2-r0 (apk)

pkg:apk/alpine/openssl@3.3.2-r0?os_name=alpine&os_version=3.20

# Dockerfile (4:31)
FROM alpine:3.20.3 as deps

ARG GO_APP
ARG GORELEASER_DIST_DIR=/go/src/dist

ARG TARGETOS
ARG TARGETARCH
ARG TARGETVARIANT

RUN mkdir -p /go/bin /go/src ${GORELEASER_DIST_DIR}

COPY --from=build ${GORELEASER_DIST_DIR}/ ${GORELEASER_DIST_DIR}

RUN <<EOT
set -e
apk add --no-cache ca-certificates jq
cd ${GORELEASER_DIST_DIR}/..

if [[ ${TARGETARCH} == "arm" ]]; then VARIANT=$(echo ${TARGETVARIANT} | sed 's/^v//'); fi
BIN_PATH=$(jq -r ".[] |select(.type == \"Binary\" and \
.name == \"${GO_APP}\" and \
.goos == \"${TARGETOS}\" and \
.goarch == \"${TARGETARCH}\" and \
(.goarm == \"${VARIANT}\" or .goarm == null)) | .path" < /go/src/dist/artifacts.json)
cp ${BIN_PATH} /go/bin
EOT

FROM alpine:3.20.3

medium : CVE--2024--12797

Affected range<3.3.3-r0
Fixed version3.3.3-r0
EPSS Score0.045%
EPSS Percentile18th percentile
Description

medium : CVE--2024--9143

Affected range<3.3.2-r1
Fixed version3.3.2-r1
EPSS Score0.044%
EPSS Percentile13th percentile
Description

medium : CVE--2024--13176

Affected range<3.3.2-r2
Fixed version3.3.2-r2
EPSS Score0.044%
EPSS Percentile15th percentile
Description