Vulnerability dashboard #8

Open
opened 2026-03-23 18:28:06 +00:00 by bot-ci · 0 comments
Owner

This issue list updates about vulnerabilites that are detected by trivy.woodpecker plugin.

Summary

Severity Count
CRITICAL 0
HIGH 9
MEDIUM 60
LOW 115
UNKNOWN 0

Detected packages and vulnerabilites

Packages

code.thinkaboutit.tech/pandora/goreleaser.woodpecker:latest (debian 13.4):

Name Version
apt 3.0.3
base-files 13.8+deb13u4
base-passwd 3.6.7
bash 5.2.37
bsdutils 2.41
coreutils 9.7
curl 8.14.1
dash 0.5.12
debconf 1.5.91
debian-archive-keyring 2025.1
debianutils 5.23.2
diffutils 3.10
dpkg 1.22.22
findutils 4.10.0
gcc-14-base 14.2.0
git 2.47.3
git-man 2.47.3
grep 3.11
gzip 1.13
hostname 3.25
init-system-helpers 1.69~deb13u1
libacl1 2.3.2
libapt-pkg7.0 3.0.3
libattr1 2.5.2
libaudit-common 4.0.2
libaudit1 4.0.2
libblkid1 2.41
libbrotli1 1.1.0
libbsd0 0.12.2
libbz2-1.0 1.0.8
libc-bin 2.41
libc6 2.41
libcap-ng0 0.8.5
libcap2 2.75
libcom-err2 1.47.2
libcrypt1 4.4.38
libcurl3t64-gnutls 8.14.1
libcurl4t64 8.14.1
libdb5.3t64 5.3.28+dfsg2
libdebconfclient0 0.280
liberror-perl 0.17030
libexpat1 2.7.1
libffi8 3.4.8
libgcc-s1 14.2.0
libgdbm-compat4t64 1.24
libgdbm6t64 1.24
libgmp10 6.3.0+dfsg
libgnutls30t64 3.8.9
libgssapi-krb5-2 1.21.3
libhogweed6t64 3.10.1
libidn2-0 2.3.8
libk5crypto3 1.21.3
libkeyutils1 1.6.3
libkrb5-3 1.21.3
libkrb5support0 1.21.3
liblastlog2-2 2.41
libldap2 2.6.10+dfsg
liblz4-1 1.10.0
liblzma5 5.8.1
libmd0 1.1.0
libmount1 2.41
libnettle8t64 3.10.1
libnghttp2-14 1.64.0
libnghttp3-9 1.8.0
libngtcp2-16 1.11.0
libngtcp2-crypto-gnutls8 1.11.0
libp11-kit0 0.25.5
libpam-modules 1.7.0
libpam-modules-bin 1.7.0
libpam-runtime 1.7.0
libpam0g 1.7.0
libpcre2-8-0 10.46
libperl5.40 5.40.1
libpsl5t64 0.21.2
librtmp1 2.4+20151223.gitfa8646d.1
libsasl2-2 2.1.28+dfsg1
libsasl2-modules-db 2.1.28+dfsg1
libseccomp2 2.6.0
libselinux1 3.8.1
libsemanage-common 3.8.1
libsemanage2 3.8.1
libsepol2 3.8.1
libsmartcols1 2.41
libsqlite3-0 3.46.1
libssh2-1t64 1.11.1
libssl3t64 3.5.5
libstdc++6 14.2.0
libsystemd0 257.9
libtasn1-6 4.20.0
libtinfo6 6.5+20250216
libudev1 257.9
libunistring5 1.3
libuuid1 2.41
libxxhash0 0.8.3
libzstd1 1.5.7+dfsg
login 4.16.0-2+really2.41
login.defs 4.17.4
mawk 1.3.4.20250131
mount 2.41
ncurses-base 6.5+20250216
ncurses-bin 6.5+20250216
openssl-provider-legacy 3.5.5
passwd 4.17.4
perl 5.40.1
perl-base 5.40.1
perl-modules-5.40 5.40.1
sed 4.9
sqv 1.3.0
sysvinit-utils 3.14
tar 1.35+dfsg
tzdata 2026a
util-linux 2.41
zlib1g 1.3.dfsg+really1.3.1

test/go.mod:

Name Version
test
Vulnerabilities

code.thinkaboutit.tech/pandora/goreleaser.woodpecker:latest (debian 13.4):

Package Name Severity Installed version Fixed Version Status Link
apt LOW 3.0.3 affected CVE-2011-3374
bash LOW 5.2.37-2+b8 affected TEMP-0841856-B18BAF
bsdutils MEDIUM 1:2.41-5 affected CVE-2026-27456
bsdutils LOW 1:2.41-5 affected CVE-2022-0563
bsdutils LOW 1:2.41-5 affected CVE-2025-14104
bsdutils LOW 1:2.41-5 affected CVE-2026-3184
coreutils LOW 9.7-3 affected CVE-2017-18018
coreutils LOW 9.7-3 affected CVE-2025-5278
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-13034
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14524
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14819
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-1965
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3783
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3784
curl MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3805
curl LOW 8.14.1-2+deb13u2 affected CVE-2025-10966
curl LOW 8.14.1-2+deb13u2 affected CVE-2025-14017
curl LOW 8.14.1-2+deb13u2 affected CVE-2025-15079
curl LOW 8.14.1-2+deb13u2 affected CVE-2025-15224
git LOW 1:2.47.3-0+deb13u1 affected CVE-2018-1000021
git LOW 1:2.47.3-0+deb13u1 affected CVE-2022-24975
git LOW 1:2.47.3-0+deb13u1 affected CVE-2024-52005
git-man LOW 1:2.47.3-0+deb13u1 affected CVE-2018-1000021
git-man LOW 1:2.47.3-0+deb13u1 affected CVE-2022-24975
git-man LOW 1:2.47.3-0+deb13u1 affected CVE-2024-52005
libapt-pkg7.0 LOW 3.0.3 affected CVE-2011-3374
libblkid1 MEDIUM 2.41-5 affected CVE-2026-27456
libblkid1 LOW 2.41-5 affected CVE-2022-0563
libblkid1 LOW 2.41-5 affected CVE-2025-14104
libblkid1 LOW 2.41-5 affected CVE-2026-3184
libc-bin MEDIUM 2.41-12+deb13u2 fix_deferred CVE-2026-4046
libc-bin MEDIUM 2.41-12+deb13u2 affected CVE-2026-4437
libc-bin MEDIUM 2.41-12+deb13u2 affected CVE-2026-4438
libc-bin LOW 2.41-12+deb13u2 affected CVE-2010-4756
libc-bin LOW 2.41-12+deb13u2 affected CVE-2018-20796
libc-bin LOW 2.41-12+deb13u2 affected CVE-2019-1010022
libc-bin LOW 2.41-12+deb13u2 affected CVE-2019-1010023
libc-bin LOW 2.41-12+deb13u2 affected CVE-2019-1010024
libc-bin LOW 2.41-12+deb13u2 affected CVE-2019-1010025
libc-bin LOW 2.41-12+deb13u2 affected CVE-2019-9192
libc6 MEDIUM 2.41-12+deb13u2 fix_deferred CVE-2026-4046
libc6 MEDIUM 2.41-12+deb13u2 affected CVE-2026-4437
libc6 MEDIUM 2.41-12+deb13u2 affected CVE-2026-4438
libc6 LOW 2.41-12+deb13u2 affected CVE-2010-4756
libc6 LOW 2.41-12+deb13u2 affected CVE-2018-20796
libc6 LOW 2.41-12+deb13u2 affected CVE-2019-1010022
libc6 LOW 2.41-12+deb13u2 affected CVE-2019-1010023
libc6 LOW 2.41-12+deb13u2 affected CVE-2019-1010024
libc6 LOW 2.41-12+deb13u2 affected CVE-2019-1010025
libc6 LOW 2.41-12+deb13u2 affected CVE-2019-9192
libcap2 MEDIUM 1:2.75-10+b8 affected CVE-2026-4878
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-13034
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14524
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14819
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-1965
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3783
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3784
libcurl3t64-gnutls MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3805
libcurl3t64-gnutls LOW 8.14.1-2+deb13u2 affected CVE-2025-10966
libcurl3t64-gnutls LOW 8.14.1-2+deb13u2 affected CVE-2025-14017
libcurl3t64-gnutls LOW 8.14.1-2+deb13u2 affected CVE-2025-15079
libcurl3t64-gnutls LOW 8.14.1-2+deb13u2 affected CVE-2025-15224
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-13034
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14524
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2025-14819
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-1965
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3783
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3784
libcurl4t64 MEDIUM 8.14.1-2+deb13u2 affected CVE-2026-3805
libcurl4t64 LOW 8.14.1-2+deb13u2 affected CVE-2025-10966
libcurl4t64 LOW 8.14.1-2+deb13u2 affected CVE-2025-14017
libcurl4t64 LOW 8.14.1-2+deb13u2 affected CVE-2025-15079
libcurl4t64 LOW 8.14.1-2+deb13u2 affected CVE-2025-15224
libexpat1 HIGH 2.7.1-2 affected CVE-2026-25210
libexpat1 MEDIUM 2.7.1-2 affected CVE-2025-59375
libexpat1 MEDIUM 2.7.1-2 fix_deferred CVE-2025-66382
libexpat1 MEDIUM 2.7.1-2 affected CVE-2026-32776
libexpat1 MEDIUM 2.7.1-2 affected CVE-2026-32777
libexpat1 MEDIUM 2.7.1-2 affected CVE-2026-32778
libexpat1 LOW 2.7.1-2 affected CVE-2026-24515
libgnutls30t64 LOW 3.8.9-3+deb13u2 affected CVE-2011-3389
libgssapi-krb5-2 LOW 1.21.3-5 affected CVE-2018-5709
libgssapi-krb5-2 LOW 1.21.3-5 affected CVE-2024-26458
libgssapi-krb5-2 LOW 1.21.3-5 affected CVE-2024-26461
libk5crypto3 LOW 1.21.3-5 affected CVE-2018-5709
libk5crypto3 LOW 1.21.3-5 affected CVE-2024-26458
libk5crypto3 LOW 1.21.3-5 affected CVE-2024-26461
libkrb5-3 LOW 1.21.3-5 affected CVE-2018-5709
libkrb5-3 LOW 1.21.3-5 affected CVE-2024-26458
libkrb5-3 LOW 1.21.3-5 affected CVE-2024-26461
libkrb5support0 LOW 1.21.3-5 affected CVE-2018-5709
libkrb5support0 LOW 1.21.3-5 affected CVE-2024-26458
libkrb5support0 LOW 1.21.3-5 affected CVE-2024-26461
liblastlog2-2 MEDIUM 2.41-5 affected CVE-2026-27456
liblastlog2-2 LOW 2.41-5 affected CVE-2022-0563
liblastlog2-2 LOW 2.41-5 affected CVE-2025-14104
liblastlog2-2 LOW 2.41-5 affected CVE-2026-3184
libldap2 LOW 2.6.10+dfsg-1 affected CVE-2015-3276
libldap2 LOW 2.6.10+dfsg-1 affected CVE-2017-14159
libldap2 LOW 2.6.10+dfsg-1 affected CVE-2017-17740
libldap2 LOW 2.6.10+dfsg-1 affected CVE-2020-15719
libldap2 LOW 2.6.10+dfsg-1 affected CVE-2026-22185
liblzma5 MEDIUM 5.8.1-1 affected CVE-2026-34743
libmount1 MEDIUM 2.41-5 affected CVE-2026-27456
libmount1 LOW 2.41-5 affected CVE-2022-0563
libmount1 LOW 2.41-5 affected CVE-2025-14104
libmount1 LOW 2.41-5 affected CVE-2026-3184
libnghttp2-14 HIGH 1.64.0-1.1 affected CVE-2026-27135
libperl5.40 LOW 5.40.1-6 affected CVE-2011-4116
libsmartcols1 MEDIUM 2.41-5 affected CVE-2026-27456
libsmartcols1 LOW 2.41-5 affected CVE-2022-0563
libsmartcols1 LOW 2.41-5 affected CVE-2025-14104
libsmartcols1 LOW 2.41-5 affected CVE-2026-3184
libsqlite3-0 LOW 3.46.1-7+deb13u1 affected CVE-2021-45346
libsqlite3-0 LOW 3.46.1-7+deb13u1 affected CVE-2025-70873
libssl3t64 HIGH 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28390
libssl3t64 MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28388
libssl3t64 MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28389
libssl3t64 MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-31789
libssl3t64 MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-31790
libssl3t64 LOW 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-2673
libssl3t64 LOW 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28387
libsystemd0 HIGH 257.9-1~deb13u1 affected CVE-2026-29111
libsystemd0 MEDIUM 257.9-1~deb13u1 affected CVE-2026-40225
libsystemd0 MEDIUM 257.9-1~deb13u1 affected CVE-2026-40226
libsystemd0 MEDIUM 257.9-1~deb13u1 affected CVE-2026-4105
libsystemd0 LOW 257.9-1~deb13u1 affected CVE-2013-4392
libsystemd0 LOW 257.9-1~deb13u1 affected CVE-2023-31437
libsystemd0 LOW 257.9-1~deb13u1 affected CVE-2023-31438
libsystemd0 LOW 257.9-1~deb13u1 affected CVE-2023-31439
libsystemd0 LOW 257.9-1~deb13u1 affected CVE-2026-40228
libtasn1-6 MEDIUM 4.20.0-2 affected CVE-2025-13151
libtinfo6 HIGH 6.5+20250216-2 affected CVE-2025-69720
libtinfo6 LOW 6.5+20250216-2 affected CVE-2025-6141
libudev1 HIGH 257.9-1~deb13u1 affected CVE-2026-29111
libudev1 MEDIUM 257.9-1~deb13u1 affected CVE-2026-40225
libudev1 MEDIUM 257.9-1~deb13u1 affected CVE-2026-40226
libudev1 MEDIUM 257.9-1~deb13u1 affected CVE-2026-4105
libudev1 LOW 257.9-1~deb13u1 affected CVE-2013-4392
libudev1 LOW 257.9-1~deb13u1 affected CVE-2023-31437
libudev1 LOW 257.9-1~deb13u1 affected CVE-2023-31438
libudev1 LOW 257.9-1~deb13u1 affected CVE-2023-31439
libudev1 LOW 257.9-1~deb13u1 affected CVE-2026-40228
libuuid1 MEDIUM 2.41-5 affected CVE-2026-27456
libuuid1 LOW 2.41-5 affected CVE-2022-0563
libuuid1 LOW 2.41-5 affected CVE-2025-14104
libuuid1 LOW 2.41-5 affected CVE-2026-3184
login MEDIUM 1:4.16.0-2+really2.41-5 affected CVE-2026-27456
login LOW 1:4.16.0-2+really2.41-5 affected CVE-2022-0563
login LOW 1:4.16.0-2+really2.41-5 affected CVE-2025-14104
login LOW 1:4.16.0-2+really2.41-5 affected CVE-2026-3184
login.defs LOW 1:4.17.4-2 affected CVE-2007-5686
login.defs LOW 1:4.17.4-2 affected CVE-2024-56433
login.defs LOW 1:4.17.4-2 affected TEMP-0628843-DBAD28
mount MEDIUM 2.41-5 affected CVE-2026-27456
mount LOW 2.41-5 affected CVE-2022-0563
mount LOW 2.41-5 affected CVE-2025-14104
mount LOW 2.41-5 affected CVE-2026-3184
ncurses-base HIGH 6.5+20250216-2 affected CVE-2025-69720
ncurses-base LOW 6.5+20250216-2 affected CVE-2025-6141
ncurses-bin HIGH 6.5+20250216-2 affected CVE-2025-69720
ncurses-bin LOW 6.5+20250216-2 affected CVE-2025-6141
openssl-provider-legacy HIGH 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28390
openssl-provider-legacy MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28388
openssl-provider-legacy MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28389
openssl-provider-legacy MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-31789
openssl-provider-legacy MEDIUM 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-31790
openssl-provider-legacy LOW 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-2673
openssl-provider-legacy LOW 3.5.5-1~deb13u1 3.5.5-1~deb13u2 fixed CVE-2026-28387
passwd LOW 1:4.17.4-2 affected CVE-2007-5686
passwd LOW 1:4.17.4-2 affected CVE-2024-56433
passwd LOW 1:4.17.4-2 affected TEMP-0628843-DBAD28
perl LOW 5.40.1-6 affected CVE-2011-4116
perl-base LOW 5.40.1-6 affected CVE-2011-4116
perl-modules-5.40 LOW 5.40.1-6 affected CVE-2011-4116
sysvinit-utils LOW 3.14-4 affected TEMP-0517018-A83CE6
tar MEDIUM 1.35+dfsg-3.1 affected CVE-2026-5704
tar LOW 1.35+dfsg-3.1 affected CVE-2005-2541
tar LOW 1.35+dfsg-3.1 affected TEMP-0290435-0B57B5
util-linux MEDIUM 2.41-5 affected CVE-2026-27456
util-linux LOW 2.41-5 affected CVE-2022-0563
util-linux LOW 2.41-5 affected CVE-2025-14104
util-linux LOW 2.41-5 affected CVE-2026-3184
zlib1g MEDIUM 1:1.3.dfsg+really1.3.1-1+b1 affected CVE-2026-27171
This issue list updates about vulnerabilites that are detected by [trivy.woodpecker](https://code.thinkaboutit.tech/pandora/trivy.woodpecker) plugin. ## Summary | Severity | Count | | -------- | ----- | | CRITICAL | 0 | | HIGH | 9 | | MEDIUM | 60 | | LOW | 115 | | UNKNOWN | 0 | ## Detected packages and vulnerabilites <details><summary>Packages</summary> **code.thinkaboutit.tech/pandora/goreleaser.woodpecker:latest (debian 13.4)**: | Name | Version | | ---- | ------- | | apt | 3.0.3 | | base-files | 13.8+deb13u4 | | base-passwd | 3.6.7 | | bash | 5.2.37 | | bsdutils | 2.41 | | coreutils | 9.7 | | curl | 8.14.1 | | dash | 0.5.12 | | debconf | 1.5.91 | | debian-archive-keyring | 2025.1 | | debianutils | 5.23.2 | | diffutils | 3.10 | | dpkg | 1.22.22 | | findutils | 4.10.0 | | gcc-14-base | 14.2.0 | | git | 2.47.3 | | git-man | 2.47.3 | | grep | 3.11 | | gzip | 1.13 | | hostname | 3.25 | | init-system-helpers | 1.69~deb13u1 | | libacl1 | 2.3.2 | | libapt-pkg7.0 | 3.0.3 | | libattr1 | 2.5.2 | | libaudit-common | 4.0.2 | | libaudit1 | 4.0.2 | | libblkid1 | 2.41 | | libbrotli1 | 1.1.0 | | libbsd0 | 0.12.2 | | libbz2-1.0 | 1.0.8 | | libc-bin | 2.41 | | libc6 | 2.41 | | libcap-ng0 | 0.8.5 | | libcap2 | 2.75 | | libcom-err2 | 1.47.2 | | libcrypt1 | 4.4.38 | | libcurl3t64-gnutls | 8.14.1 | | libcurl4t64 | 8.14.1 | | libdb5.3t64 | 5.3.28+dfsg2 | | libdebconfclient0 | 0.280 | | liberror-perl | 0.17030 | | libexpat1 | 2.7.1 | | libffi8 | 3.4.8 | | libgcc-s1 | 14.2.0 | | libgdbm-compat4t64 | 1.24 | | libgdbm6t64 | 1.24 | | libgmp10 | 6.3.0+dfsg | | libgnutls30t64 | 3.8.9 | | libgssapi-krb5-2 | 1.21.3 | | libhogweed6t64 | 3.10.1 | | libidn2-0 | 2.3.8 | | libk5crypto3 | 1.21.3 | | libkeyutils1 | 1.6.3 | | libkrb5-3 | 1.21.3 | | libkrb5support0 | 1.21.3 | | liblastlog2-2 | 2.41 | | libldap2 | 2.6.10+dfsg | | liblz4-1 | 1.10.0 | | liblzma5 | 5.8.1 | | libmd0 | 1.1.0 | | libmount1 | 2.41 | | libnettle8t64 | 3.10.1 | | libnghttp2-14 | 1.64.0 | | libnghttp3-9 | 1.8.0 | | libngtcp2-16 | 1.11.0 | | libngtcp2-crypto-gnutls8 | 1.11.0 | | libp11-kit0 | 0.25.5 | | libpam-modules | 1.7.0 | | libpam-modules-bin | 1.7.0 | | libpam-runtime | 1.7.0 | | libpam0g | 1.7.0 | | libpcre2-8-0 | 10.46 | | libperl5.40 | 5.40.1 | | libpsl5t64 | 0.21.2 | | librtmp1 | 2.4+20151223.gitfa8646d.1 | | libsasl2-2 | 2.1.28+dfsg1 | | libsasl2-modules-db | 2.1.28+dfsg1 | | libseccomp2 | 2.6.0 | | libselinux1 | 3.8.1 | | libsemanage-common | 3.8.1 | | libsemanage2 | 3.8.1 | | libsepol2 | 3.8.1 | | libsmartcols1 | 2.41 | | libsqlite3-0 | 3.46.1 | | libssh2-1t64 | 1.11.1 | | libssl3t64 | 3.5.5 | | libstdc++6 | 14.2.0 | | libsystemd0 | 257.9 | | libtasn1-6 | 4.20.0 | | libtinfo6 | 6.5+20250216 | | libudev1 | 257.9 | | libunistring5 | 1.3 | | libuuid1 | 2.41 | | libxxhash0 | 0.8.3 | | libzstd1 | 1.5.7+dfsg | | login | 4.16.0-2+really2.41 | | login.defs | 4.17.4 | | mawk | 1.3.4.20250131 | | mount | 2.41 | | ncurses-base | 6.5+20250216 | | ncurses-bin | 6.5+20250216 | | openssl-provider-legacy | 3.5.5 | | passwd | 4.17.4 | | perl | 5.40.1 | | perl-base | 5.40.1 | | perl-modules-5.40 | 5.40.1 | | sed | 4.9 | | sqv | 1.3.0 | | sysvinit-utils | 3.14 | | tar | 1.35+dfsg | | tzdata | 2026a | | util-linux | 2.41 | | zlib1g | 1.3.dfsg+really1.3.1 | **test/go.mod**: | Name | Version | | ---- | ------- | | test | | </details> <details><summary>Vulnerabilities</summary> **code.thinkaboutit.tech/pandora/goreleaser.woodpecker:latest (debian 13.4)**: | Package Name | Severity | Installed version | Fixed Version | Status | Link | | ------------ | -------- | ----------------- | ------------- | ------ | ---- | | apt | LOW | 3.0.3 | | affected | [CVE-2011-3374](https://avd.aquasec.com/nvd/cve-2011-3374) | | bash | LOW | 5.2.37-2+b8 | | affected | [TEMP-0841856-B18BAF](https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF) | | bsdutils | MEDIUM | 1:2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | bsdutils | LOW | 1:2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | bsdutils | LOW | 1:2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | bsdutils | LOW | 1:2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | coreutils | LOW | 9.7-3 | | affected | [CVE-2017-18018](https://avd.aquasec.com/nvd/cve-2017-18018) | | coreutils | LOW | 9.7-3 | | affected | [CVE-2025-5278](https://avd.aquasec.com/nvd/cve-2025-5278) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-13034](https://avd.aquasec.com/nvd/cve-2025-13034) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14524](https://avd.aquasec.com/nvd/cve-2025-14524) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14819](https://avd.aquasec.com/nvd/cve-2025-14819) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-1965](https://avd.aquasec.com/nvd/cve-2026-1965) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3783](https://avd.aquasec.com/nvd/cve-2026-3783) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3784](https://avd.aquasec.com/nvd/cve-2026-3784) | | curl | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3805](https://avd.aquasec.com/nvd/cve-2026-3805) | | curl | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-10966](https://avd.aquasec.com/nvd/cve-2025-10966) | | curl | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14017](https://avd.aquasec.com/nvd/cve-2025-14017) | | curl | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15079](https://avd.aquasec.com/nvd/cve-2025-15079) | | curl | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15224](https://avd.aquasec.com/nvd/cve-2025-15224) | | git | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2018-1000021](https://avd.aquasec.com/nvd/cve-2018-1000021) | | git | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2022-24975](https://avd.aquasec.com/nvd/cve-2022-24975) | | git | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2024-52005](https://avd.aquasec.com/nvd/cve-2024-52005) | | git-man | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2018-1000021](https://avd.aquasec.com/nvd/cve-2018-1000021) | | git-man | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2022-24975](https://avd.aquasec.com/nvd/cve-2022-24975) | | git-man | LOW | 1:2.47.3-0+deb13u1 | | affected | [CVE-2024-52005](https://avd.aquasec.com/nvd/cve-2024-52005) | | libapt-pkg7.0 | LOW | 3.0.3 | | affected | [CVE-2011-3374](https://avd.aquasec.com/nvd/cve-2011-3374) | | libblkid1 | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | libblkid1 | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | libblkid1 | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | libblkid1 | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | libc-bin | MEDIUM | 2.41-12+deb13u2 | | fix_deferred | [CVE-2026-4046](https://avd.aquasec.com/nvd/cve-2026-4046) | | libc-bin | MEDIUM | 2.41-12+deb13u2 | | affected | [CVE-2026-4437](https://avd.aquasec.com/nvd/cve-2026-4437) | | libc-bin | MEDIUM | 2.41-12+deb13u2 | | affected | [CVE-2026-4438](https://avd.aquasec.com/nvd/cve-2026-4438) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2010-4756](https://avd.aquasec.com/nvd/cve-2010-4756) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2018-20796](https://avd.aquasec.com/nvd/cve-2018-20796) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010022](https://avd.aquasec.com/nvd/cve-2019-1010022) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010023](https://avd.aquasec.com/nvd/cve-2019-1010023) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010024](https://avd.aquasec.com/nvd/cve-2019-1010024) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010025](https://avd.aquasec.com/nvd/cve-2019-1010025) | | libc-bin | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-9192](https://avd.aquasec.com/nvd/cve-2019-9192) | | libc6 | MEDIUM | 2.41-12+deb13u2 | | fix_deferred | [CVE-2026-4046](https://avd.aquasec.com/nvd/cve-2026-4046) | | libc6 | MEDIUM | 2.41-12+deb13u2 | | affected | [CVE-2026-4437](https://avd.aquasec.com/nvd/cve-2026-4437) | | libc6 | MEDIUM | 2.41-12+deb13u2 | | affected | [CVE-2026-4438](https://avd.aquasec.com/nvd/cve-2026-4438) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2010-4756](https://avd.aquasec.com/nvd/cve-2010-4756) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2018-20796](https://avd.aquasec.com/nvd/cve-2018-20796) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010022](https://avd.aquasec.com/nvd/cve-2019-1010022) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010023](https://avd.aquasec.com/nvd/cve-2019-1010023) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010024](https://avd.aquasec.com/nvd/cve-2019-1010024) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-1010025](https://avd.aquasec.com/nvd/cve-2019-1010025) | | libc6 | LOW | 2.41-12+deb13u2 | | affected | [CVE-2019-9192](https://avd.aquasec.com/nvd/cve-2019-9192) | | libcap2 | MEDIUM | 1:2.75-10+b8 | | affected | [CVE-2026-4878](https://avd.aquasec.com/nvd/cve-2026-4878) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-13034](https://avd.aquasec.com/nvd/cve-2025-13034) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14524](https://avd.aquasec.com/nvd/cve-2025-14524) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14819](https://avd.aquasec.com/nvd/cve-2025-14819) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-1965](https://avd.aquasec.com/nvd/cve-2026-1965) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3783](https://avd.aquasec.com/nvd/cve-2026-3783) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3784](https://avd.aquasec.com/nvd/cve-2026-3784) | | libcurl3t64-gnutls | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3805](https://avd.aquasec.com/nvd/cve-2026-3805) | | libcurl3t64-gnutls | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-10966](https://avd.aquasec.com/nvd/cve-2025-10966) | | libcurl3t64-gnutls | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14017](https://avd.aquasec.com/nvd/cve-2025-14017) | | libcurl3t64-gnutls | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15079](https://avd.aquasec.com/nvd/cve-2025-15079) | | libcurl3t64-gnutls | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15224](https://avd.aquasec.com/nvd/cve-2025-15224) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-13034](https://avd.aquasec.com/nvd/cve-2025-13034) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14524](https://avd.aquasec.com/nvd/cve-2025-14524) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14819](https://avd.aquasec.com/nvd/cve-2025-14819) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-1965](https://avd.aquasec.com/nvd/cve-2026-1965) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3783](https://avd.aquasec.com/nvd/cve-2026-3783) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3784](https://avd.aquasec.com/nvd/cve-2026-3784) | | libcurl4t64 | MEDIUM | 8.14.1-2+deb13u2 | | affected | [CVE-2026-3805](https://avd.aquasec.com/nvd/cve-2026-3805) | | libcurl4t64 | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-10966](https://avd.aquasec.com/nvd/cve-2025-10966) | | libcurl4t64 | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-14017](https://avd.aquasec.com/nvd/cve-2025-14017) | | libcurl4t64 | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15079](https://avd.aquasec.com/nvd/cve-2025-15079) | | libcurl4t64 | LOW | 8.14.1-2+deb13u2 | | affected | [CVE-2025-15224](https://avd.aquasec.com/nvd/cve-2025-15224) | | libexpat1 | HIGH | 2.7.1-2 | | affected | [CVE-2026-25210](https://avd.aquasec.com/nvd/cve-2026-25210) | | libexpat1 | MEDIUM | 2.7.1-2 | | affected | [CVE-2025-59375](https://avd.aquasec.com/nvd/cve-2025-59375) | | libexpat1 | MEDIUM | 2.7.1-2 | | fix_deferred | [CVE-2025-66382](https://avd.aquasec.com/nvd/cve-2025-66382) | | libexpat1 | MEDIUM | 2.7.1-2 | | affected | [CVE-2026-32776](https://avd.aquasec.com/nvd/cve-2026-32776) | | libexpat1 | MEDIUM | 2.7.1-2 | | affected | [CVE-2026-32777](https://avd.aquasec.com/nvd/cve-2026-32777) | | libexpat1 | MEDIUM | 2.7.1-2 | | affected | [CVE-2026-32778](https://avd.aquasec.com/nvd/cve-2026-32778) | | libexpat1 | LOW | 2.7.1-2 | | affected | [CVE-2026-24515](https://avd.aquasec.com/nvd/cve-2026-24515) | | libgnutls30t64 | LOW | 3.8.9-3+deb13u2 | | affected | [CVE-2011-3389](https://avd.aquasec.com/nvd/cve-2011-3389) | | libgssapi-krb5-2 | LOW | 1.21.3-5 | | affected | [CVE-2018-5709](https://avd.aquasec.com/nvd/cve-2018-5709) | | libgssapi-krb5-2 | LOW | 1.21.3-5 | | affected | [CVE-2024-26458](https://avd.aquasec.com/nvd/cve-2024-26458) | | libgssapi-krb5-2 | LOW | 1.21.3-5 | | affected | [CVE-2024-26461](https://avd.aquasec.com/nvd/cve-2024-26461) | | libk5crypto3 | LOW | 1.21.3-5 | | affected | [CVE-2018-5709](https://avd.aquasec.com/nvd/cve-2018-5709) | | libk5crypto3 | LOW | 1.21.3-5 | | affected | [CVE-2024-26458](https://avd.aquasec.com/nvd/cve-2024-26458) | | libk5crypto3 | LOW | 1.21.3-5 | | affected | [CVE-2024-26461](https://avd.aquasec.com/nvd/cve-2024-26461) | | libkrb5-3 | LOW | 1.21.3-5 | | affected | [CVE-2018-5709](https://avd.aquasec.com/nvd/cve-2018-5709) | | libkrb5-3 | LOW | 1.21.3-5 | | affected | [CVE-2024-26458](https://avd.aquasec.com/nvd/cve-2024-26458) | | libkrb5-3 | LOW | 1.21.3-5 | | affected | [CVE-2024-26461](https://avd.aquasec.com/nvd/cve-2024-26461) | | libkrb5support0 | LOW | 1.21.3-5 | | affected | [CVE-2018-5709](https://avd.aquasec.com/nvd/cve-2018-5709) | | libkrb5support0 | LOW | 1.21.3-5 | | affected | [CVE-2024-26458](https://avd.aquasec.com/nvd/cve-2024-26458) | | libkrb5support0 | LOW | 1.21.3-5 | | affected | [CVE-2024-26461](https://avd.aquasec.com/nvd/cve-2024-26461) | | liblastlog2-2 | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | liblastlog2-2 | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | liblastlog2-2 | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | liblastlog2-2 | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | libldap2 | LOW | 2.6.10+dfsg-1 | | affected | [CVE-2015-3276](https://avd.aquasec.com/nvd/cve-2015-3276) | | libldap2 | LOW | 2.6.10+dfsg-1 | | affected | [CVE-2017-14159](https://avd.aquasec.com/nvd/cve-2017-14159) | | libldap2 | LOW | 2.6.10+dfsg-1 | | affected | [CVE-2017-17740](https://avd.aquasec.com/nvd/cve-2017-17740) | | libldap2 | LOW | 2.6.10+dfsg-1 | | affected | [CVE-2020-15719](https://avd.aquasec.com/nvd/cve-2020-15719) | | libldap2 | LOW | 2.6.10+dfsg-1 | | affected | [CVE-2026-22185](https://avd.aquasec.com/nvd/cve-2026-22185) | | liblzma5 | MEDIUM | 5.8.1-1 | | affected | [CVE-2026-34743](https://avd.aquasec.com/nvd/cve-2026-34743) | | libmount1 | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | libmount1 | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | libmount1 | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | libmount1 | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | libnghttp2-14 | HIGH | 1.64.0-1.1 | | affected | [CVE-2026-27135](https://avd.aquasec.com/nvd/cve-2026-27135) | | libperl5.40 | LOW | 5.40.1-6 | | affected | [CVE-2011-4116](https://avd.aquasec.com/nvd/cve-2011-4116) | | libsmartcols1 | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | libsmartcols1 | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | libsmartcols1 | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | libsmartcols1 | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | libsqlite3-0 | LOW | 3.46.1-7+deb13u1 | | affected | [CVE-2021-45346](https://avd.aquasec.com/nvd/cve-2021-45346) | | libsqlite3-0 | LOW | 3.46.1-7+deb13u1 | | affected | [CVE-2025-70873](https://avd.aquasec.com/nvd/cve-2025-70873) | | libssl3t64 | HIGH | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390) | | libssl3t64 | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388) | | libssl3t64 | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389) | | libssl3t64 | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789) | | libssl3t64 | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790) | | libssl3t64 | LOW | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673) | | libssl3t64 | LOW | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387) | | libsystemd0 | HIGH | 257.9-1~deb13u1 | | affected | [CVE-2026-29111](https://avd.aquasec.com/nvd/cve-2026-29111) | | libsystemd0 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-40225](https://avd.aquasec.com/nvd/cve-2026-40225) | | libsystemd0 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-40226](https://avd.aquasec.com/nvd/cve-2026-40226) | | libsystemd0 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-4105](https://avd.aquasec.com/nvd/cve-2026-4105) | | libsystemd0 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2013-4392](https://avd.aquasec.com/nvd/cve-2013-4392) | | libsystemd0 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31437](https://avd.aquasec.com/nvd/cve-2023-31437) | | libsystemd0 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31438](https://avd.aquasec.com/nvd/cve-2023-31438) | | libsystemd0 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31439](https://avd.aquasec.com/nvd/cve-2023-31439) | | libsystemd0 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2026-40228](https://avd.aquasec.com/nvd/cve-2026-40228) | | libtasn1-6 | MEDIUM | 4.20.0-2 | | affected | [CVE-2025-13151](https://avd.aquasec.com/nvd/cve-2025-13151) | | libtinfo6 | HIGH | 6.5+20250216-2 | | affected | [CVE-2025-69720](https://avd.aquasec.com/nvd/cve-2025-69720) | | libtinfo6 | LOW | 6.5+20250216-2 | | affected | [CVE-2025-6141](https://avd.aquasec.com/nvd/cve-2025-6141) | | libudev1 | HIGH | 257.9-1~deb13u1 | | affected | [CVE-2026-29111](https://avd.aquasec.com/nvd/cve-2026-29111) | | libudev1 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-40225](https://avd.aquasec.com/nvd/cve-2026-40225) | | libudev1 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-40226](https://avd.aquasec.com/nvd/cve-2026-40226) | | libudev1 | MEDIUM | 257.9-1~deb13u1 | | affected | [CVE-2026-4105](https://avd.aquasec.com/nvd/cve-2026-4105) | | libudev1 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2013-4392](https://avd.aquasec.com/nvd/cve-2013-4392) | | libudev1 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31437](https://avd.aquasec.com/nvd/cve-2023-31437) | | libudev1 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31438](https://avd.aquasec.com/nvd/cve-2023-31438) | | libudev1 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2023-31439](https://avd.aquasec.com/nvd/cve-2023-31439) | | libudev1 | LOW | 257.9-1~deb13u1 | | affected | [CVE-2026-40228](https://avd.aquasec.com/nvd/cve-2026-40228) | | libuuid1 | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | libuuid1 | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | libuuid1 | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | libuuid1 | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | login | MEDIUM | 1:4.16.0-2+really2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | login | LOW | 1:4.16.0-2+really2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | login | LOW | 1:4.16.0-2+really2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | login | LOW | 1:4.16.0-2+really2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | login.defs | LOW | 1:4.17.4-2 | | affected | [CVE-2007-5686](https://avd.aquasec.com/nvd/cve-2007-5686) | | login.defs | LOW | 1:4.17.4-2 | | affected | [CVE-2024-56433](https://avd.aquasec.com/nvd/cve-2024-56433) | | login.defs | LOW | 1:4.17.4-2 | | affected | [TEMP-0628843-DBAD28](https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28) | | mount | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | mount | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | mount | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | mount | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | ncurses-base | HIGH | 6.5+20250216-2 | | affected | [CVE-2025-69720](https://avd.aquasec.com/nvd/cve-2025-69720) | | ncurses-base | LOW | 6.5+20250216-2 | | affected | [CVE-2025-6141](https://avd.aquasec.com/nvd/cve-2025-6141) | | ncurses-bin | HIGH | 6.5+20250216-2 | | affected | [CVE-2025-69720](https://avd.aquasec.com/nvd/cve-2025-69720) | | ncurses-bin | LOW | 6.5+20250216-2 | | affected | [CVE-2025-6141](https://avd.aquasec.com/nvd/cve-2025-6141) | | openssl-provider-legacy | HIGH | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28390](https://avd.aquasec.com/nvd/cve-2026-28390) | | openssl-provider-legacy | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28388](https://avd.aquasec.com/nvd/cve-2026-28388) | | openssl-provider-legacy | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28389](https://avd.aquasec.com/nvd/cve-2026-28389) | | openssl-provider-legacy | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-31789](https://avd.aquasec.com/nvd/cve-2026-31789) | | openssl-provider-legacy | MEDIUM | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-31790](https://avd.aquasec.com/nvd/cve-2026-31790) | | openssl-provider-legacy | LOW | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-2673](https://avd.aquasec.com/nvd/cve-2026-2673) | | openssl-provider-legacy | LOW | 3.5.5-1~deb13u1 | 3.5.5-1~deb13u2 | fixed | [CVE-2026-28387](https://avd.aquasec.com/nvd/cve-2026-28387) | | passwd | LOW | 1:4.17.4-2 | | affected | [CVE-2007-5686](https://avd.aquasec.com/nvd/cve-2007-5686) | | passwd | LOW | 1:4.17.4-2 | | affected | [CVE-2024-56433](https://avd.aquasec.com/nvd/cve-2024-56433) | | passwd | LOW | 1:4.17.4-2 | | affected | [TEMP-0628843-DBAD28](https://security-tracker.debian.org/tracker/TEMP-0628843-DBAD28) | | perl | LOW | 5.40.1-6 | | affected | [CVE-2011-4116](https://avd.aquasec.com/nvd/cve-2011-4116) | | perl-base | LOW | 5.40.1-6 | | affected | [CVE-2011-4116](https://avd.aquasec.com/nvd/cve-2011-4116) | | perl-modules-5.40 | LOW | 5.40.1-6 | | affected | [CVE-2011-4116](https://avd.aquasec.com/nvd/cve-2011-4116) | | sysvinit-utils | LOW | 3.14-4 | | affected | [TEMP-0517018-A83CE6](https://security-tracker.debian.org/tracker/TEMP-0517018-A83CE6) | | tar | MEDIUM | 1.35+dfsg-3.1 | | affected | [CVE-2026-5704](https://avd.aquasec.com/nvd/cve-2026-5704) | | tar | LOW | 1.35+dfsg-3.1 | | affected | [CVE-2005-2541](https://avd.aquasec.com/nvd/cve-2005-2541) | | tar | LOW | 1.35+dfsg-3.1 | | affected | [TEMP-0290435-0B57B5](https://security-tracker.debian.org/tracker/TEMP-0290435-0B57B5) | | util-linux | MEDIUM | 2.41-5 | | affected | [CVE-2026-27456](https://avd.aquasec.com/nvd/cve-2026-27456) | | util-linux | LOW | 2.41-5 | | affected | [CVE-2022-0563](https://avd.aquasec.com/nvd/cve-2022-0563) | | util-linux | LOW | 2.41-5 | | affected | [CVE-2025-14104](https://avd.aquasec.com/nvd/cve-2025-14104) | | util-linux | LOW | 2.41-5 | | affected | [CVE-2026-3184](https://avd.aquasec.com/nvd/cve-2026-3184) | | zlib1g | MEDIUM | 1:1.3.dfsg+really1.3.1-1+b1 | | affected | [CVE-2026-27171](https://avd.aquasec.com/nvd/cve-2026-27171) | </details>
Sign in to join this conversation.
No labels
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
pandora/goreleaser.woodpecker#8
No description provided.