Skip to main content
Testkube 2.8.0 is out! Autonomous AI Agents, Custom AI Models, fail-fast and input/output parameters for Workflows, and much more. Read More

testkube-tw-init-2.8.3_linux_amd64

digestsha256:a82bcf632e290487548aca48ed99aa2d5e0bb4bc1e53c68250204573441229e4
vulnerabilitiescritical: 0 high: 1 medium: 0 low: 0 unspecified: 9
platformlinux/amd64
size19 MB
packages182
critical: 0 high: 1 medium: 0 low: 0 github.com/docker/cli 29.3.0+incompatible (golang)

pkg:golang/github.com/docker/cli@29.3.0%2Bincompatible

# tw-init.Dockerfile (18:18)
COPY --from=build /app/testworkflow-init /init

high : CVE--2025--15558

Affected range>=19.03.0+incompatible
Fixed versionNot Fixed
EPSS Score0.023%
EPSS Percentile6th percentile
Description

Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows in github.com/docker/cli

critical: 0 high: 0 medium: 0 low: 0 unspecified: 7stdlib 1.26.1 (golang)

pkg:golang/stdlib@1.26.1

# tw-init.Dockerfile (18:18)
COPY --from=build /app/testworkflow-init /init

unspecified : CVE--2026--33810

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

When verifying a certificate chain containing excluded DNS constraints, these constraints are not correctly applied to wildcard DNS SANs which use a different case than the constraint.

This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

unspecified : CVE--2026--32289

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

Context was not properly tracked across template branches for JS template literals, leading to possibly incorrect escaping of content when branches were used. Additionally template actions within JS template literals did not properly track the brace depth, leading to incorrect escaping being applied.

These issues could cause actions within JS template literals to be incorrectly or improperly escaped, leading to XSS vulnerabilities.

unspecified : CVE--2026--32288

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

tar.Reader can allocate an unbounded amount of memory when reading a maliciously-crafted archive containing a large number of sparse regions encoded in the "old GNU sparse map" format.

unspecified : CVE--2026--32283

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

If one side of the TLS connection sends multiple key update messages post-handshake in a single record, the connection can deadlock, causing uncontrolled consumption of resources. This can lead to a denial of service.

This only affects TLS 1.3.

unspecified : CVE--2026--32282

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root.

The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target is a symlink lying outside the root, so the impact is limited to cases where the target is replaced with a symlink between the check and operation.

unspecified : CVE--2026--32281

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

Validating certificate chains which use policies is unexpectedly inefficient when certificates in the chain contain a very large number of policy mappings, possibly causing denial of service.

This only affects validation of otherwise trusted certificate chains, issued by a root CA in the VerifyOptions.Roots CertPool, or in the system certificate pool.

unspecified : CVE--2026--32280

Affected range
>=1.26.0-0
<1.26.2
Fixed version1.26.2
Description

During chain building, the amount of work that is done is not correctly limited when a large number of intermediate certificates are passed in VerifyOptions.Intermediates, which can lead to a denial of service. This affects both direct users of crypto/x509 and users of crypto/tls.

critical: 0 high: 0 medium: 0 low: 0 unspecified: 2github.com/jackc/pgx/v5 5.9.1 (golang)

pkg:golang/github.com/jackc/pgx/v5@5.9.1

# tw-init.Dockerfile (18:18)
COPY --from=build /app/testworkflow-init /init

unspecified : CVE--2026--33816

Affected range>=0
Fixed versionNot Fixed
Description

Memory-safety vulnerability in github.com/jackc/pgx/v5.

unspecified : CVE--2026--33815

Affected range>=0
Fixed versionNot Fixed
Description

Memory-safety vulnerability in github.com/jackc/pgx/v5.