Skip to main content
Testkube 1.21 is out! A new Execution Dashboard, Webhook Credentials and Test/Suite Deprecation are some of the major enhancements, Read More

testkube-tw-init-2.5.2_linux_amd64

digestsha256:3754eb94bbadbbe01ab0da1c840cbb7a9f193eeecf314711e80e7eaa98d5a74a
vulnerabilitiescritical: 0 high: 1 medium: 2 low: 0
platformlinux/amd64
size19 MB
packages170
critical: 0 high: 1 medium: 2 low: 0 golang.org/x/crypto 0.41.0 (golang)

pkg:golang/golang.org/x/crypto@0.41.0
high : CVE--2025--47913

Affected range<0.43.0
Fixed version0.43.0
EPSS Score0.019%
EPSS Percentile4th percentile
Description

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

medium 5.3: CVE--2025--58181 Allocation of Resources Without Limits or Throttling

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.087%
EPSS Percentile26th percentile
Description

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

medium 5.3: CVE--2025--47914 Out-of-bounds Read

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.016%
EPSS Percentile3rd percentile
Description

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.