Skip to main content
New to Testkube? Unleash the power of cloud native testing in Kubernetes with Testkube. Get Started >

testkube-api-server-2.1.150_linux_arm64

digestsha256:0f4745dfdf1b62b53198650fd9f6ae70580acef6fb4b32e511f23e5bad98b8e8
vulnerabilitiescritical: 0 high: 3 medium: 7 low: 0
platformlinux/arm64
size63 MB
packages209
critical: 0 high: 1 medium: 0 low: 0 libexpat 2.6.4-r0 (apk)

pkg:apk/alpine/libexpat@2.6.4-r0?arch=aarch64&distro=alpine-3.20.3&upstream=expat

# api-server.Dockerfile (34:34)
RUN apk --no-cache add ca-certificates libssl3 git

high : CVE--2024--8176

Affected range<2.7.0-r0
Fixed version2.7.0-r0
EPSS Score0.358%
EPSS Percentile57th percentile
Description
critical: 0 high: 1 medium: 0 low: 0 golang.org/x/oauth2 0.26.0 (golang)

pkg:golang/golang.org/x/oauth2@0.26.0

# api-server.Dockerfile (36:36)
COPY --from=build /app /bin/app

high : CVE--2025--22868

Affected range<0.27.0
Fixed version0.27.0
EPSS Score0.056%
EPSS Percentile18th percentile
Description

An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.

critical: 0 high: 1 medium: 0 low: 0 musl 1.2.5-r0 (apk)

pkg:apk/alpine/musl@1.2.5-r0?arch=aarch64&distro=alpine-3.20.3

# api-server.Dockerfile (33:33)
FROM ${ALPINE_IMAGE}

high : CVE--2025--26519

Affected range<1.2.5-r1
Fixed version1.2.5-r1
EPSS Score0.010%
EPSS Percentile1st percentile
Description
critical: 0 high: 0 medium: 3 low: 0 libssl3 3.3.2-r0 (apk)

pkg:apk/alpine/libssl3@3.3.2-r0?arch=aarch64&distro=alpine-3.20.3&upstream=openssl

# api-server.Dockerfile (33:33)
FROM ${ALPINE_IMAGE}

medium : CVE--2024--12797

Affected range<3.3.3-r0
Fixed version3.3.3-r0
EPSS Score0.130%
EPSS Percentile34th percentile
Description

medium : CVE--2024--9143

Affected range<3.3.2-r1
Fixed version3.3.2-r1
EPSS Score0.372%
EPSS Percentile58th percentile
Description

medium : CVE--2024--13176

Affected range<3.3.2-r2
Fixed version3.3.2-r2
EPSS Score0.033%
EPSS Percentile8th percentile
Description
critical: 0 high: 0 medium: 2 low: 0 golang.org/x/net 0.34.0 (golang)

pkg:golang/golang.org/x/net@0.34.0

# api-server.Dockerfile (36:36)
COPY --from=build /app /bin/app

medium 5.3: CVE--2025--22872 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Affected range<0.38.0
Fixed version0.38.0
CVSS Score5.3
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N
EPSS Score0.016%
EPSS Percentile2nd percentile
Description

The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).

medium 4.4: CVE--2025--22870 Misinterpretation of Input

Affected range<0.36.0
Fixed version0.36.0
CVSS Score4.4
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
EPSS Score0.008%
EPSS Percentile0th percentile
Description

Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.

critical: 0 high: 0 medium: 1 low: 0 github.com/vektah/gqlparser/v2 2.5.2-0.20230422221642-25e09f9d292d (golang)

pkg:golang/github.com/vektah/gqlparser@2.5.2-0.20230422221642-25e09f9d292d#v2

# api-server.Dockerfile (36:36)
COPY --from=build /app /bin/app

medium 5.3: CVE--2023--49559 Uncontrolled Resource Consumption

Affected range<2.5.14
Fixed version2.5.14
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.061%
EPSS Percentile20th percentile
Description

An issue in vektah gqlparser open-source-library v.2.5.10 allows a remote attacker to cause a denial of service via a crafted script to the parserDirectives function.

critical: 0 high: 0 medium: 1 low: 0 gopkg.in/square/go-jose.v2 2.6.0 (golang)

pkg:golang/gopkg.in/square/go-jose.v2@2.6.0

# api-server.Dockerfile (36:36)
COPY --from=build /app /bin/app

medium 4.3: CVE--2024--28180 Improper Handling of Highly Compressed Data (Data Amplification)

Affected range<=2.6.0
Fixed versionNot Fixed
CVSS Score4.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.247%
EPSS Percentile48th percentile
Description

Impact

An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). Thanks to Enze Wang@Alioth and Jianjun Chen@Zhongguancun Lab (@zer0yu and @chenjj) for reporting.

Patches

The problem is fixed in the following packages and versions:

  • github.com/go-jose/go-jose/v4 version 4.0.1
  • github.com/go-jose/go-jose/v3 version 3.0.3
  • gopkg.in/go-jose/go-jose.v2 version 2.6.3

The problem will not be fixed in the following package because the package is archived:

  • gopkg.in/square/go-jose.v2