Skip to main content
Testkube 1.21 is out! A new Execution Dashboard, Webhook Credentials and Test/Suite Deprecation are some of the major enhancements, Read More

testkube-tw-toolkit-2.5.1_linux_amd64

digestsha256:7d402173946251dbea930de5388033c432d9dfc2e8981f45374b453c019f90a1
vulnerabilitiescritical: 0 high: 3 medium: 7 low: 4
platformlinux/amd64
size52 MB
packages206
critical: 0 high: 1 medium: 2 low: 0 golang.org/x/crypto 0.41.0 (golang)

pkg:golang/golang.org/x/crypto@0.41.0

# tw-toolkit.Dockerfile (28:28)
COPY --from=build /app/testworkflow-init /init

high : CVE--2025--47913

Affected range<0.43.0
Fixed version0.43.0
EPSS Score0.019%
EPSS Percentile4th percentile
Description

SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.

medium 5.3: CVE--2025--58181 Allocation of Resources Without Limits or Throttling

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.089%
EPSS Percentile26th percentile
Description

SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.

medium 5.3: CVE--2025--47914 Out-of-bounds Read

Affected range<0.45.0
Fixed version0.45.0
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
EPSS Score0.050%
EPSS Percentile16th percentile
Description

SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.

critical: 0 high: 1 medium: 2 low: 0 libssl3 3.3.3-r0 (apk)

pkg:apk/alpine/libssl3@3.3.3-r0?arch=x86_64&distro=alpine-3.20.6&upstream=openssl

# tw-toolkit.Dockerfile (24:24)
FROM ${ALPINE_IMAGE}

high : CVE--2025--9230

Affected range<3.3.5-r0
Fixed version3.3.5-r0
EPSS Score0.026%
EPSS Percentile6th percentile
Description

medium : CVE--2025--9231

Affected range<3.3.5-r0
Fixed version3.3.5-r0
EPSS Score0.016%
EPSS Percentile3rd percentile
Description

medium : CVE--2025--9232

Affected range<3.3.5-r0
Fixed version3.3.5-r0
EPSS Score0.027%
EPSS Percentile7th percentile
Description
critical: 0 high: 1 medium: 1 low: 0 c-ares 1.33.1-r0 (apk)

pkg:apk/alpine/c-ares@1.33.1-r0?arch=x86_64&distro=alpine-3.20.6

# tw-toolkit.Dockerfile (25:25)
RUN apk --no-cache add ca-certificates libssl3 git openssh-client

high : CVE--2025--31498

Affected range<=1.33.1-r0
Fixed versionNot Fixed
EPSS Score0.147%
EPSS Percentile36th percentile
Description

medium : CVE--2025--62408

Affected range<=1.33.1-r0
Fixed versionNot Fixed
EPSS Score0.052%
EPSS Percentile16th percentile
Description
critical: 0 high: 0 medium: 1 low: 2 openssh-keygen 9.7_p1-r5 (apk)

pkg:apk/alpine/openssh-keygen@9.7_p1-r5?arch=x86_64&distro=alpine-3.20.6&upstream=openssh

# tw-toolkit.Dockerfile (25:25)
RUN apk --no-cache add ca-certificates libssl3 git openssh-client

medium : CVE--2025--32728

Affected range<=9.7_p1-r5
Fixed versionNot Fixed
EPSS Score0.052%
EPSS Percentile16th percentile
Description

low : CVE--2025--61985

Affected range<=9.7_p1-r5
Fixed versionNot Fixed
EPSS Score0.013%
EPSS Percentile1st percentile
Description

low : CVE--2025--61984

Affected range<=9.7_p1-r5
Fixed versionNot Fixed
EPSS Score0.007%
EPSS Percentile0th percentile
Description
critical: 0 high: 0 medium: 1 low: 0 libcurl 8.14.1-r2 (apk)

pkg:apk/alpine/libcurl@8.14.1-r2?arch=x86_64&distro=alpine-3.20.6&upstream=curl

# tw-toolkit.Dockerfile (25:25)
RUN apk --no-cache add ca-certificates libssl3 git openssh-client

medium : CVE--2025--10966

Affected range<=8.14.1-r2
Fixed versionNot Fixed
EPSS Score0.017%
EPSS Percentile3rd percentile
Description
critical: 0 high: 0 medium: 0 low: 2 ssl_client 1.36.1-r29 (apk)

pkg:apk/alpine/ssl_client@1.36.1-r29?arch=x86_64&distro=alpine-3.20.6&upstream=busybox

# tw-toolkit.Dockerfile (24:24)
FROM ${ALPINE_IMAGE}

low : CVE--2025--46394

Affected range<1.36.1-r31
Fixed version1.36.1-r31
EPSS Score0.017%
EPSS Percentile3rd percentile
Description

low : CVE--2024--58251

Affected range<1.36.1-r31
Fixed version1.36.1-r31
EPSS Score0.020%
EPSS Percentile4th percentile
Description