Skip to content

test: Add an extra test for membership repository. #11

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 19, 2025

Conversation

maleficarum
Copy link
Owner

Check that the repository returns a populated collection of memberships

…ository returns a populated collection of memberships
@maleficarum maleficarum merged commit 44c1c57 into development May 19, 2025
1 check passed
Copy link

Your image maleficarum/eversports:c1eaa5e935d2f8faf14b0a622ccc9816b6484d0f critical: 1 high: 3 medium: 8 low: 115 unspecified: 5
Current base image node:23.11.0 critical: 1 high: 3 medium: 8 low: 115 unspecified: 5
Updated base image node:23.11.1-slim critical: 1 high: 0 medium: 2 low: 23

Copy link

🔍 Vulnerabilities of maleficarum/eversports:c1eaa5e935d2f8faf14b0a622ccc9816b6484d0f

📦 Image Reference maleficarum/eversports:c1eaa5e935d2f8faf14b0a622ccc9816b6484d0f
digestsha256:aa3ed481998ede38747e1c55dab7f78add28622db1c351656659535323a9fd0d
vulnerabilitiescritical: 1 high: 3 medium: 8 low: 115 unspecified: 5
platformlinux/amd64
size506 MB
packages1337
📦 Base Image node:23
also known as
  • 23-bookworm
  • 23.11
  • 23.11-bookworm
  • 23.11.0
  • 23.11.0-bookworm
  • bookworm
  • current
  • current-bookworm
  • latest
digestsha256:de2d8c00f6b1938eefdf575b5c1efa314a48dd8842a5983ec275cb11e8e6685c
vulnerabilitiescritical: 1 high: 3 medium: 8 low: 115 unspecified: 5
critical: 1 high: 0 medium: 0 low: 7 glibc 2.36-9+deb12u10 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u10?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

critical : CVE--2025--4802

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.044%
EPSS Percentile13th percentile
Description

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).


low : CVE--2019--9192

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.164%
EPSS Percentile38th percentile
Description

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(|)(\1\1)*' in grep, a different issue than CVE-2018-20796. NOTE: the software maintainer disputes that this is a vulnerability because the behavior occurs only with a crafted pattern


low : CVE--2019--1010025

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.235%
EPSS Percentile47th percentile
Description

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may guess the heap addresses of pthread_created thread. The component is: glibc. NOTE: the vendor's position is "ASLR bypass itself is not a vulnerability.


low : CVE--2019--1010024

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.375%
EPSS Percentile58th percentile
Description

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass ASLR using cache of thread stack and heap. The component is: glibc. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.


low : CVE--2019--1010023

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.393%
EPSS Percentile59th percentile
Description

GNU Libc current is affected by: Re-mapping current loaded library with malicious ELF file. The impact is: In worst case attacker may evaluate privileges. The component is: libld. The attack vector is: Attacker sends 2 ELF files to victim and asks to run ldd on it. ldd execute code. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.


low : CVE--2019--1010022

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.226%
EPSS Percentile46th percentile
Description

GNU Libc current is affected by: Mitigation bypass. The impact is: Attacker may bypass stack guard protection. The component is: nptl. The attack vector is: Exploit stack buffer overflow vulnerability and use this bypass vulnerability to bypass stack guard. NOTE: Upstream comments indicate "this is being treated as a non-security bug and no real threat.


low : CVE--2018--20796

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score1.996%
EPSS Percentile83rd percentile
Description

In the GNU C Library (aka glibc or libc6) through 2.29, check_dst_limits_calc_pos_1 in posix/regexec.c has Uncontrolled Recursion, as demonstrated by '(\227|)(\1\1|t1|\\2537)+' in grep.


low : CVE--2010--4756

Affected range>=2.36-9+deb12u10
Fixed versionNot Fixed
EPSS Score0.373%
EPSS Percentile58th percentile
Description

The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.


  • glibc (unimportant)
  • eglibc (unimportant)
    That's standard POSIX behaviour implemented by (e)glibc. Applications using
    glob need to impose limits for themselves
critical: 0 high: 3 medium: 0 low: 3 libxml2 2.9.14+dfsg-1.3~deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdfsg-1.3~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

high : CVE--2022--49043

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.023%
EPSS Percentile5th percentile
Description

xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.


[experimental] - libxml2 2.12.3+dfsg-0exp1

high : CVE--2025--24928

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.007%
EPSS Percentile0th percentile
Description

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.


high : CVE--2024--56171

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.007%
EPSS Percentile0th percentile
Description

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.


low : CVE--2025--32415

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.019%
EPSS Percentile3rd percentile
Description

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.


low : CVE--2025--27113

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.050%
EPSS Percentile15th percentile
Description

libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.


low : CVE--2024--34459

Affected range>=2.9.14+dfsg-1.3~deb12u1
Fixed versionNot Fixed
EPSS Score0.139%
EPSS Percentile35th percentile
Description

An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.


critical: 0 high: 0 medium: 2 low: 2 libwmf 0.2.12-5.1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2009--3546

Affected range>=0.2.12-5.1
Fixed versionNot Fixed
EPSS Score3.046%
EPSS Percentile86th percentile
Description

The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.


medium : CVE--2007--3996

Affected range>=0.2.12-5.1
Fixed versionNot Fixed
EPSS Score6.959%
EPSS Percentile91st percentile
Description

Multiple integer overflows in libgd in PHP before 5.2.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large (1) srcW or (2) srcH value to the (a) gdImageCopyResized function, or a large (3) sy (height) or (4) sx (width) value to the (b) gdImageCreate or the (c) gdImageCreateTrueColor function.


low : CVE--2007--3477

Affected range>=0.2.12-5.1
Fixed versionNot Fixed
EPSS Score6.743%
EPSS Percentile91st percentile
Description

The (a) imagearc and (b) imagefilledarc functions in GD Graphics Library (libgd) before 2.0.35 allow attackers to cause a denial of service (CPU consumption) via a large (1) start or (2) end angle degree value.


low : CVE--2007--3476

Affected range>=0.2.12-5.1
Fixed versionNot Fixed
EPSS Score5.183%
EPSS Percentile89th percentile
Description

Array index error in gd_gif_in.c in the GD Graphics Library (libgd) before 2.0.35 allows user-assisted remote attackers to cause a denial of service (crash and heap corruption) via large color index values in crafted image data, which results in a segmentation fault.


critical: 0 high: 0 medium: 1 low: 1 shadow 1:4.13+dfsg1-1 (deb)

pkg:deb/debian/shadow@1%3A4.13%2Bdfsg1-1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2023--4641

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
EPSS Score0.016%
EPSS Percentile2nd percentile
Description

A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.


low : CVE--2023--29383

Affected range<1:4.13+dfsg1-1+deb12u1
Fixed version1:4.13+dfsg1-1+deb12u1
EPSS Score0.026%
EPSS Percentile6th percentile
Description

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.


critical: 0 high: 0 medium: 1 low: 1 openssl 3.0.15-1~deb12u1 (deb)

pkg:deb/debian/[email protected]~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2024--13176

Affected range<3.0.16-1~deb12u1
Fixed version3.0.16-1~deb12u1
EPSS Score0.024%
EPSS Percentile5th percentile
Description

Issue summary: A timing side-channel which could potentially allow recovering the private key exists in the ECDSA signature computation. Impact summary: A timing side-channel in ECDSA signature computations could allow recovering the private key by an attacker. However, measuring the timing would require either local access to the signing application or a very fast network connection with low latency. There is a timing signal of around 300 nanoseconds when the top word of the inverted ECDSA nonce value is zero. This can happen with significant probability only for some of the supported elliptic curves. In particular the NIST P-521 curve is affected. To be able to measure this leak, the attacker process must either be located in the same physical computer or must have a very fast network connection with low latency. For that reason the severity of this vulnerability is Low. The FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.


low : CVE--2010--0928

Affected range>=3.0.11-1~deb12u2
Fixed versionNot Fixed
EPSS Score0.098%
EPSS Percentile29th percentile
Description

OpenSSL 0.9.8i on the Gaisler Research LEON3 SoC on the Xilinx Virtex-II Pro FPGA uses a Fixed Width Exponentiation (FWE) algorithm for certain signature calculations, and does not verify the signature before providing it to a caller, which makes it easier for physically proximate attackers to determine the private key via a modified supply voltage for the microprocessor, related to a "fault-based attack."


http://www.eecs.umich.edu/~valeria/research/publications/DATE10RSA.pdf
openssl/openssl#24540
Fault injection based attacks are not within OpenSSLs threat model according
to the security policy: https://www.openssl.org/policies/general/security-policy.html

critical: 0 high: 0 medium: 1 low: 1 python3.11 3.11.2-6+deb12u5 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u5?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2025--0938

Affected range<3.11.2-6+deb12u6
Fixed version3.11.2-6+deb12u6
EPSS Score1.024%
EPSS Percentile76th percentile
Description

The Python standard library functions urllib.parse.urlsplit and urlparse accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers.


low : CVE--2025--1795

Affected range<3.11.2-6+deb12u6
Fixed version3.11.2-6+deb12u6
EPSS Score0.167%
EPSS Percentile39th percentile
Description

During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers.


critical: 0 high: 0 medium: 1 low: 0 postgresql-15 15.12-0+deb12u2 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2025--4207

Affected range<15.13-0+deb12u1
Fixed version15.13-0+deb12u1
EPSS Score0.049%
EPSS Percentile15th percentile
Description

Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.


critical: 0 high: 0 medium: 1 low: 0 openssh 1:9.2p1-2+deb12u5 (deb)

pkg:deb/debian/openssh@1%3A9.2p1-2%2Bdeb12u5?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2025--32728

Affected range<1:9.2p1-2+deb12u6
Fixed version1:9.2p1-2+deb12u6
EPSS Score0.030%
EPSS Percentile7th percentile
Description

In sshd in OpenSSH before 10.0, the DisableForwarding directive does not adhere to the documentation stating that it disables X11 and agent forwarding.


critical: 0 high: 0 medium: 1 low: 0 libcap2 1:2.66-4 (deb)

pkg:deb/debian/libcap2@1%3A2.66-4?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

medium : CVE--2025--1390

Affected range<1:2.66-4+deb12u1
Fixed version1:2.66-4+deb12u1
EPSS Score0.021%
EPSS Percentile4th percentile
Description

The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames.


critical: 0 high: 0 medium: 0 low: 23 binutils 2.40-2 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--3198

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.014%
EPSS Percentile2nd percentile
Description

A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1182

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.100%
EPSS Percentile29th percentile
Description

A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1181

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.106%
EPSS Percentile30th percentile
Description

A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1180

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.098%
EPSS Percentile29th percentile
Description

A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1179

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.107%
EPSS Percentile30th percentile
Description

A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".


low : CVE--2025--1178

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.138%
EPSS Percentile35th percentile
Description

A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1176

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.107%
EPSS Percentile30th percentile
Description

A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1153

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.125%
EPSS Percentile33rd percentile
Description

A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.


low : CVE--2025--1152

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.059%
EPSS Percentile19th percentile
Description

A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."


low : CVE--2025--1151

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.059%
EPSS Percentile19th percentile
Description

A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."


low : CVE--2025--1150

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.059%
EPSS Percentile19th percentile
Description

A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."


low : CVE--2025--1149

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.059%
EPSS Percentile19th percentile
Description

A vulnerability was found in GNU Binutils 2.43. It has been classified as problematic. This affects the function xstrdup of the file libiberty/xmalloc.c of the component ld. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."


low : CVE--2025--1148

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.132%
EPSS Percentile34th percentile
Description

A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."


low : CVE--2025--1147

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.123%
EPSS Percentile33rd percentile
Description

A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.


low : CVE--2025--0840

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.093%
EPSS Percentile28th percentile
Description

A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.


low : CVE--2024--57360

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.019%
EPSS Percentile3rd percentile
Description

https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: nm --without-symbol-version function.


low : CVE--2024--53589

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.032%
EPSS Percentile8th percentile
Description

GNU objdump 2.43 is vulnerable to Buffer Overflow in the BFD (Binary File Descriptor) library's handling of tekhex format files.


low : CVE--2023--1972

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.045%
EPSS Percentile14th percentile
Description

A potential heap based buffer overflow was found in _bfd_elf_slurp_version_tables() in bfd/elf.c. This may lead to loss of availability.


low : CVE--2021--32256

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.115%
EPSS Percentile32nd percentile
Description

An issue was discovered in GNU libiberty, as distributed in GNU Binutils 2.36. It is a stack-overflow issue in demangle_type in rust-demangle.c.


low : CVE--2018--9996

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.385%
EPSS Percentile59th percentile
Description

An issue was discovered in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. Stack Exhaustion occurs in the C++ demangling functions provided by libiberty, and there are recursive stack frames: demangle_template_value_parm, demangle_integral_value, and demangle_expression.


low : CVE--2018--20712

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score1.070%
EPSS Percentile77th percentile
Description

A heap-based buffer over-read exists in the function d_expression_1 in cp-demangle.c in GNU libiberty, as distributed in GNU Binutils 2.31.1. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by c++filt.


low : CVE--2018--20673

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.100%
EPSS Percentile29th percentile
Description

The demangle_template function in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.31.1, contains an integer overflow vulnerability (for "Create an array for saving the template argument values") that can trigger a heap-based buffer overflow, as demonstrated by nm.


low : CVE--2017--13716

Affected range>=2.40-2
Fixed versionNot Fixed
EPSS Score0.255%
EPSS Percentile49th percentile
Description

The C++ symbol demangler routine in cplus-dem.c in libiberty, as distributed in GNU Binutils 2.29, allows remote attackers to cause a denial of service (excessive memory allocation and application crash) via a crafted file, as demonstrated by a call from the Binary File Descriptor (BFD) library (aka libbfd).


critical: 0 high: 0 medium: 0 low: 12 openjpeg2 2.5.0-2+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2018--20846

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.313%
EPSS Percentile54th percentile
Description

Out-of-bounds accesses in the functions pi_next_lrcp, pi_next_rlcp, pi_next_rpcl, pi_next_pcrl, pi_next_rpcl, and pi_next_cprl in openmj2/pi.c in OpenJPEG through 2.3.0 allow remote attackers to cause a denial of service (application crash).


low : CVE--2018--16376

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.597%
EPSS Percentile68th percentile
Description

An issue was discovered in OpenJPEG 2.3.0. A heap-based buffer overflow was discovered in the function t2_encode_packet in lib/openmj2/t2.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly unspecified other impact.


low : CVE--2018--16375

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.439%
EPSS Percentile62nd percentile
Description

An issue was discovered in OpenJPEG 2.3.0. Missing checks for header_info.height and header_info.width in the function pnmtoimage in bin/jpwl/convert.c can lead to a heap-based buffer overflow.


low : CVE--2017--17479

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score5.154%
EPSS Percentile89th percentile
Description

In OpenJPEG 2.3.0, a stack-based buffer overflow was discovered in the pgxtoimage function in jpwl/convert.c. The vulnerability causes an out-of-bounds write, which may lead to remote denial of service or possibly remote code execution.


low : CVE--2016--9581

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.400%
EPSS Percentile60th percentile
Description

An infinite loop vulnerability in tiftoimage that results in heap buffer overflow in convert_32s_C1P1 was found in openjpeg 2.1.2.


low : CVE--2016--9580

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.449%
EPSS Percentile63rd percentile
Description

An integer overflow vulnerability was found in tiftoimage function in openjpeg 2.1.2, resulting in heap buffer overflow.


low : CVE--2016--9117

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.357%
EPSS Percentile57th percentile
Description

NULL Pointer Access in function imagetopnm of convert.c(jp2):1289 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.


low : CVE--2016--9116

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.357%
EPSS Percentile57th percentile
Description

NULL Pointer Access in function imagetopnm of convert.c:2226(jp2) in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.


low : CVE--2016--9115

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.374%
EPSS Percentile58th percentile
Description

Heap Buffer Over-read in function imagetotga of convert.c(jp2):942 in OpenJPEG 2.1.2. Impact is Denial of Service. Someone must open a crafted j2k file.


low : CVE--2016--9114

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.607%
EPSS Percentile69th percentile
Description

There is a NULL Pointer Access in function imagetopnm of convert.c:1943(jp2) of OpenJPEG 2.1.2. image->comps[compno].data is not assigned a value after initialization(NULL). Impact is Denial of Service.


low : CVE--2016--9113

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.448%
EPSS Percentile62nd percentile
Description

There is a NULL pointer dereference in function imagetobmp of convertbmp.c:980 of OpenJPEG 2.1.2. image->comps[0].data is not assigned a value after initialization(NULL). Impact is Denial of Service.


low : CVE--2016--10505

Affected range>=2.5.0-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.454%
EPSS Percentile63rd percentile
Description

NULL pointer dereference vulnerabilities in the imagetopnm function in convert.c, sycc444_to_rgb function in color.c, color_esycc_to_rgb function in color.c, and sycc422_to_rgb function in color.c in OpenJPEG before 2.2.0 allow remote attackers to cause a denial of service (application crash) via crafted j2k files.


critical: 0 high: 0 medium: 0 low: 10 unspecified: 2tiff 4.5.0-6+deb12u2 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--6716

Affected range>=4.5.0-6+deb12u1
Fixed versionNot Fixed
EPSS Score0.043%
EPSS Percentile12th percentile
Description

REJECTED


REJECTED

low : CVE--2023--6228

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.017%
EPSS Percentile3rd percentile
Description

An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.


low : CVE--2023--3164

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.010%
EPSS Percentile1st percentile
Description

A heap-buffer-overflow vulnerability was found in LibTIFF, in extractImageSection() at tools/tiffcrop.c:7916 and tools/tiffcrop.c:7801. This flaw allows attackers to cause a denial of service via a crafted tiff file.


low : CVE--2023--1916

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.017%
EPSS Percentile2nd percentile
Description

A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.


low : CVE--2022--1210

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.035%
EPSS Percentile9th percentile
Description

A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the TIFF File Handler of tiff2ps. Opening a malicious file leads to a denial of service. The attack can be launched remotely but requires user interaction. The exploit has been disclosed to the public and may be used.


low : CVE--2018--10126

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.185%
EPSS Percentile41st percentile
Description

ijg-libjpeg before 9d, as used in tiff2pdf (from LibTIFF) and other products, does not check for a NULL pointer at a certain place in jpeg_fdct_16x16 in jfdctint.c.


low : CVE--2017--9117

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.072%
EPSS Percentile23rd percentile
Description

In LibTIFF 4.0.6 and possibly other versions, the program processes BMP images without verifying that biWidth and biHeight in the bitmap-information header match the actual input, as demonstrated by a heap-based buffer over-read in bmp2tiff. NOTE: mentioning bmp2tiff does not imply that the activation point is in the bmp2tiff.c file (which was removed before the 4.0.7 release).


low : CVE--2017--5563

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.586%
EPSS Percentile68th percentile
Description

LibTIFF version 4.0.7 is vulnerable to a heap-based buffer over-read in tif_lzw.c resulting in DoS or code execution via a crafted bmp image to tools/bmp2tiff.


low : CVE--2017--17973

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score0.614%
EPSS Percentile69th percentile
Description

In LibTIFF 4.0.8, there is a heap-based use-after-free in the t2p_writeproc function in tiff2pdf.c. NOTE: there is a third-party report of inability to reproduce this issue


low : CVE--2017--16232

Affected range>=4.5.0-6+deb12u2
Fixed versionNot Fixed
EPSS Score2.211%
EPSS Percentile84th percentile
Description

LibTIFF 4.0.8 has multiple memory leak vulnerabilities, which allow attackers to cause a denial of service (memory consumption), as demonstrated by tif_open.c, tif_lzw.c, and tif_aux.c. NOTE: Third parties were unable to reproduce the issue


unspecified : CVE--2023--38289

Affected range>=4.5.0-6
Fixed versionNot Fixed
Description

REJECTED


REJECTED

unspecified : CVE--2023--38288

Affected range>=4.5.0-6
Fixed versionNot Fixed
Description

REJECTED


REJECTED

critical: 0 high: 0 medium: 0 low: 7 elfutils 0.188-2.1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--1377

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.029%
EPSS Percentile7th percentile
Description

A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1376

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.029%
EPSS Percentile7th percentile
Description

A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1372

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.025%
EPSS Percentile5th percentile
Description

A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1371

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.025%
EPSS Percentile5th percentile
Description

A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1365

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.025%
EPSS Percentile5th percentile
Description

A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue.


low : CVE--2025--1352

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.100%
EPSS Percentile29th percentile
Description

A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue.


low : CVE--2024--25260

Affected range>=0.188-2.1
Fixed versionNot Fixed
EPSS Score0.014%
EPSS Percentile2nd percentile
Description

elfutils v0.189 was discovered to contain a NULL pointer dereference via the handle_verdef() function at readelf.c.


critical: 0 high: 0 medium: 0 low: 4 patch 2.7.6-7 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2021--45261

Affected range>=2.7.6-7
Fixed versionNot Fixed
EPSS Score0.087%
EPSS Percentile26th percentile
Description

An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.


low : CVE--2018--6952

Affected range>=2.7.6-7
Fixed versionNot Fixed
EPSS Score11.377%
EPSS Percentile93rd percentile
Description

A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.


low : CVE--2018--6951

Affected range>=2.7.6-7
Fixed versionNot Fixed
EPSS Score23.094%
EPSS Percentile96th percentile
Description

An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.


low : CVE--2010--4651

Affected range>=2.7.6-7
Fixed versionNot Fixed
EPSS Score0.912%
EPSS Percentile75th percentile
Description

Directory traversal vulnerability in util.c in GNU patch 2.6.1 and earlier allows user-assisted remote attackers to create or overwrite arbitrary files via a filename that is specified with a .. (dot dot) or full pathname, a related issue to CVE-2010-1679.


critical: 0 high: 0 medium: 0 low: 4 systemd 252.36-1~deb12u1 (deb)

pkg:deb/debian/[email protected]~deb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2023--31439

Affected range>=252.36-1~deb12u1
Fixed versionNot Fixed
EPSS Score0.094%
EPSS Percentile28th percentile
Description

An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2023--31438

Affected range>=252.36-1~deb12u1
Fixed versionNot Fixed
EPSS Score0.100%
EPSS Percentile29th percentile
Description

An issue was discovered in systemd 253. An attacker can truncate a sealed log file and then resume log sealing such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2023--31437

Affected range>=252.36-1~deb12u1
Fixed versionNot Fixed
EPSS Score0.128%
EPSS Percentile34th percentile
Description

An issue was discovered in systemd 253. An attacker can modify a sealed log file such that, in some views, not all existing and sealed log messages are displayed. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."


low : CVE--2013--4392

Affected range>=252.36-1~deb12u1
Fixed versionNot Fixed
EPSS Score0.139%
EPSS Percentile35th percentile
Description

systemd, when updating file permissions, allows local users to change the permissions and SELinux security contexts for arbitrary files via a symlink attack on unspecified files.


critical: 0 high: 0 medium: 0 low: 4 openldap 2.5.13+dfsg-5 (deb)

pkg:deb/debian/[email protected]%2Bdfsg-5?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2020--15719

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
EPSS Score0.371%
EPSS Percentile58th percentile
Description

libldap in certain third-party OpenLDAP packages has a certificate-validation flaw when the third-party package is asserting RFC6125 support. It considers CN even when there is a non-matching subjectAltName (SAN). This is fixed in, for example, openldap-2.4.46-10.el8 in Red Hat Enterprise Linux.


low : CVE--2017--17740

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
EPSS Score2.071%
EPSS Percentile83rd percentile
Description

contrib/slapd-modules/nops/nops.c in OpenLDAP through 2.4.45, when both the nops module and the memberof overlay are enabled, attempts to free a buffer that was allocated on the stack, which allows remote attackers to cause a denial of service (slapd crash) via a member MODDN operation.


low : CVE--2017--14159

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
EPSS Score0.111%
EPSS Percentile31st percentile
Description

slapd in OpenLDAP 2.4.45 and earlier creates a PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for PID file modification before a root script executes a "kill cat /pathname" command, as demonstrated by openldap-initscript.


low : CVE--2015--3276

Affected range>=2.5.13+dfsg-5
Fixed versionNot Fixed
EPSS Score2.147%
EPSS Percentile83rd percentile
Description

The nss_parse_ciphers function in libraries/libldap/tls_m.c in OpenLDAP does not properly parse OpenSSL-style multi-keyword mode cipher strings, which might cause a weaker than intended cipher to be used and allow remote attackers to have unspecified impact via unknown vectors.


  • openldap (unimportant)
    Debian builds with GNUTLS, not NSS
critical: 0 high: 0 medium: 0 low: 3 git 1:2.39.5-0+deb12u2 (deb)

pkg:deb/debian/git@1%3A2.39.5-0%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--52005

Affected range>=1:2.39.5-0+deb12u2
Fixed versionNot Fixed
EPSS Score0.078%
EPSS Percentile24th percentile
Description

Git is a source code management tool. When cloning from a server (or fetching, or pushing), informational or error messages are transported from the remote Git process to the client via the so-called "sideband channel". These messages will be prefixed with "remote:" and printed directly to the standard error output. Typically, this standard error output is connected to a terminal that understands ANSI escape sequences, which Git did not protect against. Most modern terminals support control sequences that can be used by a malicious actor to hide and misrepresent information, or to mislead the user into executing untrusted scripts. As requested on the git-security mailing list, the patches are under discussion on the public mailing list. Users are advised to update as soon as possible. Users unable to upgrade should avoid recursive clones unless they are from trusted sources.


low : CVE--2022--24975

Affected range>=1:2.39.5-0+deb12u2
Fixed versionNot Fixed
EPSS Score0.711%
EPSS Percentile71st percentile
Description

The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the "GitBleed" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option. Note: This has been disputed by multiple 3rd parties who believe this is an intended feature of the git binary and does not pose a security risk.


low : CVE--2018--1000021

Affected range>=1:2.39.5-0+deb12u2
Fixed versionNot Fixed
EPSS Score0.384%
EPSS Percentile59th percentile
Description

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).


critical: 0 high: 0 medium: 0 low: 2 expat 2.5.0-1+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--28757

Affected range>=2.5.0-1+deb12u1
Fixed versionNot Fixed
EPSS Score0.474%
EPSS Percentile64th percentile
Description

libexpat through 2.6.1 allows an XML Entity Expansion attack when there is isolated use of external parsers (created via XML_ExternalEntityParserCreate).


low : CVE--2023--52426

Affected range>=2.5.0-1+deb12u1
Fixed versionNot Fixed
EPSS Score0.019%
EPSS Percentile3rd percentile
Description

libexpat through 2.5.0 allows recursive XML Entity Expansion if XML_DTD is undefined at compile time.


critical: 0 high: 0 medium: 0 low: 2 libheif 1.15.1-1+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--25269

Affected range>=1.15.1-1+deb12u1
Fixed versionNot Fixed
EPSS Score0.059%
EPSS Percentile19th percentile
Description

libheif <= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw allows an attacker to cause a denial of service attack.


low : CVE--2023--49463

Affected range>=1.15.1-1+deb12u1
Fixed versionNot Fixed
EPSS Score0.164%
EPSS Percentile38th percentile
Description

libheif v1.17.5 was discovered to contain a segmentation violation via the function find_exif_tag at /libheif/exif.cc.


critical: 0 high: 0 medium: 0 low: 2 libgcrypt20 1.10.1-3 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--2236

Affected range>=1.10.1-3
Fixed versionNot Fixed
EPSS Score0.196%
EPSS Percentile42nd percentile
Description

A timing-based side-channel flaw was found in libgcrypt's RSA implementation. This issue may allow a remote attacker to initiate a Bleichenbacher-style attack, which can lead to the decryption of RSA ciphertexts.


low : CVE--2018--6829

Affected range>=1.10.1-3
Fixed versionNot Fixed
EPSS Score1.266%
EPSS Percentile78th percentile
Description

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.


critical: 0 high: 0 medium: 0 low: 2 m4 1.4.19-3 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2008--1688

Affected range>=1.4.19-3
Fixed versionNot Fixed
EPSS Score2.196%
EPSS Percentile84th percentile
Description

Unspecified vulnerability in GNU m4 before 1.4.11 might allow context-dependent attackers to execute arbitrary code, related to improper handling of filenames specified with the -F option. NOTE: it is not clear when this issue crosses privilege boundaries.


  • m4 (unimportant)
    The file name is passed through a cmdline argument and m4 doesn't run with
    elevated privileges.

low : CVE--2008--1687

Affected range>=1.4.19-3
Fixed versionNot Fixed
EPSS Score2.727%
EPSS Percentile85th percentile
Description

The (1) maketemp and (2) mkstemp builtin functions in GNU m4 before 1.4.11 do not quote their output when a file is created, which might allow context-dependent attackers to trigger a macro expansion, leading to unspecified use of an incorrect filename.


  • m4 (unimportant)
    This is more a generic bug and not a security issue: the random output would
    need to match the name of an existing macro
critical: 0 high: 0 medium: 0 low: 2 perl 5.36.0-7+deb12u2 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2023--31486

Affected range>=5.36.0-7+deb12u2
Fixed versionNot Fixed
EPSS Score0.785%
EPSS Percentile73rd percentile
Description

HTTP::Tiny before 0.083, a Perl core module since 5.13.9 and available standalone on CPAN, has an insecure default TLS configuration where users must opt in to verify certificates.


low : CVE--2011--4116

Affected range>=5.36.0-7+deb12u2
Fixed versionNot Fixed
EPSS Score0.815%
EPSS Percentile73rd percentile
Description

_is_safe in the File::Temp module for Perl does not properly handle symlinks.


critical: 0 high: 0 medium: 0 low: 2 lcms2 2.14-2 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--29070

Affected range>=2.14-2
Fixed versionNot Fixed
EPSS Score0.138%
EPSS Percentile35th percentile
Description

A heap buffer overflow vulnerability has been identified in thesmooth2() in cmsgamma.c in lcms2-2.16 which allows a remote attacker to cause a denial of service. NOTE: the Supplier disputes this because "this is not exploitable as this function is never called on normal color management, is there only as a helper for low-level programming and investigation."


low : CVE--2025--29069

Affected range>=2.14-2
Fixed versionNot Fixed
EPSS Score0.053%
EPSS Percentile17th percentile
Description

A heap buffer overflow vulnerability has been identified in the lcms2-2.16. The vulnerability exists in the UnrollChunkyBytes function in cmspack.c, which is responsible for handling color space transformations.


mm2/Little-CMS#476
Not considered an issue in src:lcms2 but in the fuzzer

critical: 0 high: 0 medium: 0 low: 2 curl 7.88.1-10+deb12u12 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u12?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--0725

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
EPSS Score0.107%
EPSS Percentile30th percentile
Description

When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the CURLOPT_ACCEPT_ENCODING option, using zlib 1.2.0.3 or older, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.


low : CVE--2024--2379

Affected range>=7.88.1-10+deb12u12
Fixed versionNot Fixed
EPSS Score0.208%
EPSS Percentile44th percentile
Description

libcurl skips the certificate verification for a QUIC connection under certain conditions, when built to use wolfSSL. If told to use an unknown/bad cipher or curve, the error path accidentally skips the verification and returns OK, thus ignoring any certificate problems.


critical: 0 high: 0 medium: 0 low: 1 unspecified: 1krb5 1.20.1-2+deb12u2 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2024--26462

Affected range<1.20.1-2+deb12u3
Fixed version1.20.1-2+deb12u3
EPSS Score0.027%
EPSS Percentile6th percentile
Description

Kerberos 5 (aka krb5) 1.21.2 contains a memory leak vulnerability in /krb5/src/kdc/ndr.c.


unspecified : CVE--2025--24528

Affected range<1.20.1-2+deb12u3
Fixed version1.20.1-2+deb12u3
Description
critical: 0 high: 0 medium: 0 low: 1 gcc-12 12.2.0-14 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2023--4039

Affected range<12.2.0-14+deb12u1
Fixed version12.2.0-14+deb12u1
EPSS Score0.121%
EPSS Percentile33rd percentile
Description

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.


critical: 0 high: 0 medium: 0 low: 1 gnupg2 2.2.40-1.1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2022--3219

Affected range>=2.2.40-1.1
Fixed versionNot Fixed
EPSS Score0.012%
EPSS Percentile1st percentile
Description

GnuPG can be made to spin on a relatively small input by (for example) crafting a public key with thousands of signatures attached, compressed down to just a few KB.


critical: 0 high: 0 medium: 0 low: 1 sqlite3 3.40.1-2+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2021--45346

Affected range>=3.40.1-2+deb12u1
Fixed versionNot Fixed
EPSS Score0.161%
EPSS Percentile38th percentile
Description

A Memory Leak vulnerability exists in SQLite Project SQLite3 3.35.1 and 3.37.0 via maliciously crafted SQL Queries (made via editing the Database File), it is possible to query a record, and leak subsequent bytes of memory that extend beyond the record, which could let a malicious user obtain sensitive information. NOTE: The developer disputes this as a vulnerability stating that If you give SQLite a corrupted database file and submit a query against the database, it might read parts of the database that you did not intend or expect.


critical: 0 high: 0 medium: 0 low: 1 jansson 2.14-2 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2020--36325

Affected range>=2.14-2
Fixed versionNot Fixed
EPSS Score0.412%
EPSS Percentile60th percentile
Description

An issue was discovered in Jansson through 2.13.1. Due to a parsing error in json_loads, there's an out-of-bounds read-access bug. NOTE: the vendor reports that this only occurs when a programmer fails to follow the API specification


critical: 0 high: 0 medium: 0 low: 1 libxslt 1.1.35-1+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2015--9019

Affected range>=1.1.35-1+deb12u1
Fixed versionNot Fixed
EPSS Score0.978%
EPSS Percentile76th percentile
Description

In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.


critical: 0 high: 0 medium: 0 low: 1 tar 1.34+dfsg-1.2+deb12u1 (deb)

pkg:deb/debian/[email protected]%2Bdfsg-1.2%2Bdeb12u1?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2005--2541

Affected range>=1.34+dfsg-1.2+deb12u1
Fixed versionNot Fixed
EPSS Score2.806%
EPSS Percentile85th percentile
Description

Tar 1.15.1 does not properly warn the user when extracting setuid or setgid files, which may allow local users or remote attackers to gain privileges.


This is intended behaviour, after all tar is an archiving tool and you
need to give -p as a command line flag

critical: 0 high: 0 medium: 0 low: 1 openexr 3.1.5-5 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2017--14988

Affected range>=3.1.5-5
Fixed versionNot Fixed
EPSS Score0.209%
EPSS Percentile44th percentile
Description

Header::readfrom in IlmImf/ImfHeader.cpp in OpenEXR 2.2.0 allows remote attackers to cause a denial of service (excessive memory allocation) via a crafted file that is accessed with the ImfOpenInputFile function in IlmImf/ImfCRgbaFile.cpp. NOTE: The maintainer and multiple third parties believe that this vulnerability isn't valid


critical: 0 high: 0 medium: 0 low: 1 util-linux 2.38.1-5+deb12u3 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u3?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2022--0563

Affected range>=2.38.1-5+deb12u3
Fixed versionNot Fixed
EPSS Score0.025%
EPSS Percentile5th percentile
Description

A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.


critical: 0 high: 0 medium: 0 low: 1 unzip 6.0-28 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2021--4217

Affected range>=6.0-28
Fixed versionNot Fixed
EPSS Score0.125%
EPSS Percentile33rd percentile
Description

A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.


critical: 0 high: 0 medium: 0 low: 1 pixman 0.42.2-1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2023--37769

Affected range>=0.42.2-1
Fixed versionNot Fixed
EPSS Score0.030%
EPSS Percentile7th percentile
Description

stress-test master commit e4c878 was discovered to contain a FPE vulnerability via the component combine_inner at /pixman-combine-float.c.


critical: 0 high: 0 medium: 0 low: 1 coreutils 9.1-1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2017--18018

Affected range>=9.1-1
Fixed versionNot Fixed
EPSS Score0.045%
EPSS Percentile14th percentile
Description

In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.


critical: 0 high: 0 medium: 0 low: 1 imagemagick 8:6.9.11.60+dfsg-1.6+deb12u2 (deb)

pkg:deb/debian/imagemagick@8%3A6.9.11.60%2Bdfsg-1.6%2Bdeb12u2?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--43965

Affected range<8:6.9.11.60+dfsg-1.6+deb12u3
Fixed version8:6.9.11.60+dfsg-1.6+deb12u3
EPSS Score0.023%
EPSS Percentile5th percentile
Description

In MIFF image processing in ImageMagick before 7.1.1-44, image depth is mishandled after SetQuantumFormat is used.


critical: 0 high: 0 medium: 0 low: 1 cairo 1.16.0-7 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2018--18064

Affected range>=1.16.0-7
Fixed versionNot Fixed
EPSS Score0.196%
EPSS Percentile42nd percentile
Description

cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function).


critical: 0 high: 0 medium: 0 low: 1 gnutls28 3.7.9-2+deb12u4 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u4?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2011--3389

Affected range>=3.7.9-2+deb12u4
Fixed versionNot Fixed
EPSS Score5.423%
EPSS Percentile90th percentile
Description

The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.


critical: 0 high: 0 medium: 0 low: 1 jbigkit 2.1-6.1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2017--9937

Affected range>=2.1-6.1
Fixed versionNot Fixed
EPSS Score0.354%
EPSS Percentile57th percentile
Description

In LibTIFF 4.0.8, there is a memory malloc failure in tif_jbig.c. A crafted TIFF document can lead to an abort resulting in a remote denial of service attack.


critical: 0 high: 0 medium: 0 low: 1 libpng1.6 1.6.39-2 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2021--4214

Affected range>=1.6.39-2
Fixed versionNot Fixed
EPSS Score0.034%
EPSS Percentile9th percentile
Description

A heap overflow flaw was found in libpngs' pngimage.c program. This flaw allows an attacker with local network access to pass a specially crafted PNG file to the pngimage utility, causing an application to crash, leading to a denial of service.


critical: 0 high: 0 medium: 0 low: 1 glib2.0 2.74.6-2+deb12u5 (deb)

pkg:deb/debian/[email protected]%2Bdeb12u5?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2025--3360

Affected range<2.74.6-2+deb12u6
Fixed version2.74.6-2+deb12u6
EPSS Score0.090%
EPSS Percentile27th percentile
Description

A flaw was found in GLib. An integer overflow and buffer under-read occur when parsing a long invalid ISO 8601 timestamp with the g_date_time_new_from_iso8601() function.


critical: 0 high: 0 medium: 0 low: 1 apt 2.6.1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

low : CVE--2011--3374

Affected range>=2.6.1
Fixed versionNot Fixed
EPSS Score1.550%
EPSS Percentile80th percentile
Description

It was found that apt-key in apt, all versions, do not correctly validate gpg keys with the master keyring, leading to a potential man-in-the-middle attack.


critical: 0 high: 0 medium: 0 low: 0 unspecified: 2libyaml 0.2.5-1 (deb)

pkg:deb/debian/[email protected]?os_distro=bookworm&os_name=debian&os_version=12

# Dockerfile (1:1)
FROM node:23.11.0

unspecified : CVE--2024--35329

Affected range>=0.2.5-1
Fixed versionNot Fixed
EPSS Score0.043%
EPSS Percentile12th percentile
Description

libyaml 0.2.5 is vulnerable to a heap-based Buffer Overflow in yaml_document_add_sequence in api.c.


REJECTED

unspecified : CVE--2024--3205

Affected range>=0.2.5-1
Fixed versionNot Fixed
EPSS Score0.043%
EPSS Percentile12th percentile
Description

A vulnerability was found in yaml libyaml up to 0.2.5 and classified as critical. Affected by this issue is the function yaml_emitter_emit_flow_sequence_item of the file /src/libyaml/src/emitter.c. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259052. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.


REJECTED

Copy link

Recommended fixes for image maleficarum/eversports:c1eaa5e935d2f8faf14b0a622ccc9816b6484d0f

Base image is node:23.11.0

Name23.11.0
Digestsha256:de2d8c00f6b1938eefdf575b5c1efa314a48dd8842a5983ec275cb11e8e6685c
Vulnerabilitiescritical: 1 high: 3 medium: 8 low: 115 unspecified: 5
Pushed1 month ago
Size407 MB
Packages748
Runtime23.11.0
The base image is also available under the supported tag(s): 23, 23-bookworm, 23.11, 23.11-bookworm, bookworm, current, current-bookworm, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

TagDetailsPushedVulnerabilities
23.11.1-slim
Patch runtime version update
Also known as:
  • 23.11-slim
  • 23-slim
  • 23-bookworm-slim
  • 23.11-bookworm-slim
  • 23.11.1-bookworm-slim
Benefits:
  • Patch runtime version update
  • Image is smaller by 312 MB
  • Image contains 422 fewer packages
  • Tag was pushed more recently
  • Image introduces no new vulnerability but removes 101
  • Tag is using slim variant
Image details:
  • Size: 80 MB
  • Runtime: 23.11.1
4 days ago



23.11.1
Patch runtime version update
Also known as:
  • 23.11
  • 23
  • 23-bookworm
  • 23.11-bookworm
  • 23.11.1-bookworm
Benefits:
  • Patch runtime version update
  • Image is smaller by 93 KB
  • Tag was pushed more recently
  • Image has same number of vulnerabilities
  • Image contains equal number of packages
Image details:
  • Size: 407 MB
  • Runtime: 23.11.1
4 days ago



24.0.2-slim
Tag is preferred tag
Also known as:
  • 24.0-slim
  • current-slim
  • 24-slim
  • slim
  • bookworm-slim
  • 24-bookworm-slim
  • 24.0-bookworm-slim
  • 24.0.2-bookworm-slim
  • current-bookworm-slim
Benefits:
  • Image is smaller by 311 MB
  • Image contains 428 fewer packages
  • Tag is preferred tag
  • Tag was pushed more recently
  • Image introduces no new vulnerability but removes 101
  • Tag is using slim variant
Image details:
  • Size: 81 MB
  • Runtime: 22
4 days ago



@maleficarum maleficarum deleted the test/membership-repository branch May 19, 2025 19:17
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant