Skip to main content
Testkube 2.6.0 is out! A new AI Agent Framework that integrates with external MCP Servers for agentic troubleshooting, remediation, etc. Read More

testkube-api-server-2.6.1_linux_amd64

digestsha256:fcc3f6e713226bb97a6a7e0f85f8cc04a656fe235ad2e2f9530a1d075be14a29
vulnerabilitiescritical: 1 high: 4 medium: 16 low: 4
platformlinux/amd64
size70 MB
packages255
critical: 1 high: 3 medium: 6 low: 0 libssl3 3.3.5-r0 (apk)

pkg:apk/alpine/libssl3@3.3.5-r0?arch=x86_64&distro=alpine-3.20.8&upstream=openssl

# api-server.Dockerfile (33:33)
FROM ${ALPINE_IMAGE}

critical : CVE--2025--15467

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.662%
EPSS Percentile71st percentile
Description

high : CVE--2025--69421

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.059%
EPSS Percentile18th percentile
Description

high : CVE--2025--69420

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.070%
EPSS Percentile21st percentile
Description

high : CVE--2025--69419

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.056%
EPSS Percentile17th percentile
Description

medium : CVE--2025--66199

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.059%
EPSS Percentile18th percentile
Description

medium : CVE--2025--15468

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.048%
EPSS Percentile15th percentile
Description

medium : CVE--2026--22795

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.015%
EPSS Percentile3rd percentile
Description

medium : CVE--2026--22796

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.070%
EPSS Percentile22nd percentile
Description

medium : CVE--2025--68160

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.014%
EPSS Percentile2nd percentile
Description

medium : CVE--2025--69418

Affected range<3.3.6-r0
Fixed version3.3.6-r0
EPSS Score0.005%
EPSS Percentile0th percentile
Description
critical: 0 high: 1 medium: 1 low: 0 c-ares 1.33.1-r0 (apk)

pkg:apk/alpine/c-ares@1.33.1-r0?arch=x86_64&distro=alpine-3.20.8

# api-server.Dockerfile (34:34)
RUN apk --no-cache add ca-certificates libssl3 git

high : CVE--2025--31498

Affected range<=1.33.1-r0
Fixed versionNot Fixed
EPSS Score0.618%
EPSS Percentile69th percentile
Description

medium : CVE--2025--62408

Affected range<=1.33.1-r0
Fixed versionNot Fixed
EPSS Score0.060%
EPSS Percentile19th percentile
Description
critical: 0 high: 0 medium: 6 low: 1 libcurl 8.14.1-r2 (apk)

pkg:apk/alpine/libcurl@8.14.1-r2?arch=x86_64&distro=alpine-3.20.8&upstream=curl

# api-server.Dockerfile (34:34)
RUN apk --no-cache add ca-certificates libssl3 git

medium : CVE--2025--14017

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.007%
EPSS Percentile0th percentile
Description

medium : CVE--2025--13034

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.021%
EPSS Percentile5th percentile
Description

medium : CVE--2025--15079

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.022%
EPSS Percentile5th percentile
Description

medium : CVE--2025--14819

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.039%
EPSS Percentile12th percentile
Description

medium : CVE--2025--14524

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.022%
EPSS Percentile5th percentile
Description

medium : CVE--2025--10966

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.015%
EPSS Percentile3rd percentile
Description

low : CVE--2025--15224

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.053%
EPSS Percentile17th percentile
Description
critical: 0 high: 0 medium: 1 low: 2 ssl_client 1.36.1-r30 (apk)

pkg:apk/alpine/ssl_client@1.36.1-r30?arch=x86_64&distro=alpine-3.20.8&upstream=busybox

# api-server.Dockerfile (33:33)
FROM ${ALPINE_IMAGE}

medium : CVE--2025--60876

Affected range<=1.36.1-r30
Fixed versionNot Fixed
EPSS Score0.052%
EPSS Percentile16th percentile
Description

low : CVE--2025--46394

Affected range<1.36.1-r31
Fixed version1.36.1-r31
EPSS Score0.031%
EPSS Percentile8th percentile
Description

low : CVE--2024--58251

Affected range<1.36.1-r31
Fixed version1.36.1-r31
EPSS Score0.023%
EPSS Percentile5th percentile
Description
critical: 0 high: 0 medium: 1 low: 1 libexpat 2.7.3-r0 (apk)

pkg:apk/alpine/libexpat@2.7.3-r0?arch=x86_64&distro=alpine-3.20.8&upstream=expat

# api-server.Dockerfile (34:34)
RUN apk --no-cache add ca-certificates libssl3 git

medium : CVE--2026--25210

Affected range<2.7.4-r0
Fixed version2.7.4-r0
EPSS Score0.006%
EPSS Percentile0th percentile
Description

low : CVE--2026--24515

Affected range<2.7.4-r0
Fixed version2.7.4-r0
EPSS Score0.005%
EPSS Percentile0th percentile
Description
critical: 0 high: 0 medium: 1 low: 0 github.com/go-jose/go-jose 2.6.3+incompatible (golang)

pkg:golang/github.com/go-jose/go-jose@2.6.3%2Bincompatible

# api-server.Dockerfile (36:36)
COPY --from=build /app /bin/app

medium 6.9: CVE--2025--27144 Uncontrolled Resource Consumption

Affected range<3.0.4
Fixed version3.0.4
CVSS Score6.9
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N
EPSS Score0.078%
EPSS Percentile23rd percentile
Description

Impact

When parsing compact JWS or JWE input, go-jose could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of '.' characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service.

Patches

Version 4.0.5 fixes this issue

Workarounds

Applications could pre-validate payloads passed to go-jose do not contain an excessive number of '.' characters.

References

This is the same sort of issue as in the golang.org/x/oauth2/jws package as CVE-2025-22868 and Go issue https://go.dev/issue/71490.