Skip to content

Update dependency go to v1.25.5 #809

Update dependency go to v1.25.5

Update dependency go to v1.25.5 #809

Triggered via push December 12, 2025 16:35
Status Success
Total duration 5m 9s
Artifacts

build-image.yml

on: push
Fit to window
Zoom out
Zoom in

Annotations

9 errors, 10 warnings, and 10 notices
build / build
CVE-2025-61729 - HIGH severity - crypto/x509: Excessive resource consumption when printing error string for host certificate validation in crypto/x509 vulnerability in stdlib
build / build
CVE-2025-58187 - HIGH severity - Due to the design of the name constraint checking algorithm, the proce ... vulnerability in stdlib
build / build
CVE-2025-58186 - HIGH severity - Despite HTTP headers having a default limit of 1MB, the number of cook ... vulnerability in stdlib
build / build
CVE-2025-58183 - HIGH severity - golang: archive/tar: Unbounded allocation when parsing GNU sparse map vulnerability in stdlib
build / build
CVE-2023-45853 - CRITICAL severity - zlib: integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_6 vulnerability in zlib1g
build / build
CVE-2022-4899 - HIGH severity - zstd: mysql: buffer overrun in util.c vulnerability in libzstd1
build / build
CVE-2021-33560 - HIGH severity - libgcrypt: mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm vulnerability in libgcrypt20
build / build
CVE-2019-8457 - CRITICAL severity - sqlite: heap out-of-bound read in function rtreenode() vulnerability in libdb5.3
build / build
CVE-2022-3715 - HIGH severity - bash: a heap-buffer-overflow in valid_parameter_transform vulnerability in bash
build / build
CVE-2025-14104 - MEDIUM severity - util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames vulnerability in libmount1
build / build
CVE-2025-8058 - MEDIUM severity - glibc: Double free in glibc vulnerability in libc6
build / build
CVE-2023-4813 - MEDIUM severity - glibc: potential use-after-free in gaih_inet() vulnerability in libc6
build / build
CVE-2023-4806 - MEDIUM severity - glibc: potential use-after-free in getaddrinfo() vulnerability in libc6
build / build
CVE-2025-8058 - MEDIUM severity - glibc: Double free in glibc vulnerability in libc-bin
build / build
CVE-2023-4813 - MEDIUM severity - glibc: potential use-after-free in gaih_inet() vulnerability in libc-bin
build / build
CVE-2023-4806 - MEDIUM severity - glibc: potential use-after-free in getaddrinfo() vulnerability in libc-bin
build / build
CVE-2025-14104 - MEDIUM severity - util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames vulnerability in libblkid1
build / build
CVE-2025-30258 - MEDIUM severity - gnupg: verification DoS due to a malicious subkey in the keyring vulnerability in gpgv
build / build
CVE-2025-14104 - MEDIUM severity - util-linux: util-linux: Heap buffer overread in setpwnam() when processing 256-byte usernames vulnerability in bsdutils
build / build
CVE-2022-3219 - LOW severity - gnupg: denial of service issue (resource consumption) using compressed packets vulnerability in gpgv
build / build
CVE-2023-4039 - LOW severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in gcc-9-base
build / build
CVE-2023-4039 - LOW severity - gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64 vulnerability in gcc-10-base
build / build
CVE-2025-6297 - LOW severity - It was discovered that dpkg-deb does not properly sanitize directory p ... vulnerability in dpkg
build / build
CVE-2025-5278 - LOW severity - coreutils: Heap Buffer Under-Read in GNU Coreutils sort via Key Specification vulnerability in coreutils
build / build
CVE-2017-18018 - LOW severity - coreutils: race condition vulnerability in chown and chgrp vulnerability in coreutils
build / build
CVE-2016-2781 - LOW severity - coreutils: Non-privileged session can escape to the parent session in chroot vulnerability in coreutils
build / build
CVE-2022-0563 - LOW severity - util-linux: partial disclosure of arbitrary files in chfn and chsh when compiled with libreadline vulnerability in bsdutils
build / build
TEMP-0841856-B18BAF - LOW severity - [Privilege escalation possible to other user than root] vulnerability in bash
build / build
CVE-2011-3374 - LOW severity - It was found that apt-key in apt, all versions, do not correctly valid ... vulnerability in apt