Skip to main content
New to Testkube? Unleash the power of cloud native testing in Kubernetes with Testkube. Get Started >

testkube-tw-toolkit-2.1.88_linux_amd64

digestsha256:2633bca30619cf6762aa11d91d0fb106f12a23274babb2f32474d73f53b7b19b
vulnerabilitiescritical: 0 high: 0 medium: 3 low: 0 unspecified: 1
platformlinux/amd64
size34 MB
packages177
critical: 0 high: 0 medium: 2 low: 0 unspecified: 1openssl 3.3.2-r0 (apk)

pkg:apk/alpine/openssl@3.3.2-r0?os_name=alpine&os_version=3.20
medium : CVE--2024--9143

Affected range<3.3.2-r1
Fixed version3.3.2-r1
EPSS Score0.044%
EPSS Percentile12th percentile
Description

medium : CVE--2024--13176

Affected range<3.3.2-r2
Fixed version3.3.2-r2
EPSS Score0.044%
EPSS Percentile15th percentile
Description

unspecified : CVE--2024--12797

Affected range<3.3.3-r0
Fixed version3.3.3-r0
Description
critical: 0 high: 0 medium: 1 low: 0 stdlib 1.23.5 (golang)

pkg:golang/stdlib@1.23.5
medium : CVE--2025--22866

Affected range
>=1.23.0-0
<1.23.6
Fixed version1.23.6
EPSS Score0.045%
EPSS Percentile18th percentile
Description

Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.