Skip to main content
New to Testkube? Unleash the power of cloud native testing in Kubernetes with Testkube. Get Started >

testkube-tw-toolkit-2.1.88_linux_arm64

digestsha256:19fedf6192c944eca46019c0094c55b5389a507c66fe12b47fadaa6475f6290a
vulnerabilitiescritical: 0 high: 0 medium: 3 low: 0 unspecified: 1
platformlinux/arm64
size33 MB
packages177
critical: 0 high: 0 medium: 2 low: 0 unspecified: 1openssl 3.3.2-r0 (apk)

pkg:apk/alpine/openssl@3.3.2-r0?os_name=alpine&os_version=3.20
medium : CVE--2024--9143

Affected range<3.3.2-r1
Fixed version3.3.2-r1
EPSS Score0.044%
EPSS Percentile12th percentile
Description

medium : CVE--2024--13176

Affected range<3.3.2-r2
Fixed version3.3.2-r2
EPSS Score0.044%
EPSS Percentile15th percentile
Description

unspecified : CVE--2024--12797

Affected range<3.3.3-r0
Fixed version3.3.3-r0
Description
critical: 0 high: 0 medium: 1 low: 0 stdlib 1.23.5 (golang)

pkg:golang/stdlib@1.23.5
medium : CVE--2025--22866

Affected range
>=1.23.0-0
<1.23.6
Fixed version1.23.6
EPSS Score0.045%
EPSS Percentile18th percentile
Description

Due to the usage of a variable time instruction in the assembly implementation of an internal function, a small number of bits of secret scalars are leaked on the ppc64le architecture. Due to the way this function is used, we do not believe this leakage is enough to allow recovery of the private key when P-256 is used in any well known protocols.