Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Mar 31, 2025

This PR contains the following updates:

Package Type Update Change
go (source) toolchain minor 1.23.5 -> 1.24.1
golangci/golangci-lint stage major v1.63.4 -> v2.0.2

Release Notes

golang/go (go)

v1.24.1

v1.24.0

v1.23.7

v1.23.6

golangci/golangci-lint (golangci/golangci-lint)

v2.0.2

Compare Source

  1. Misc.
    • Fixes flags parsing for formatters
    • Fixes the filepath used by the exclusion source option
  2. Documentation
    • Adds a section about flags migration
    • Cleaning pages with v1 options

v2.0.1

Compare Source

  1. Linters/formatters bug fixes
    • golines: fix settings during linter load
  2. Misc.
    • Validates the version field before the configuration
    • forbidigo: fix migration

v2.0.0

Compare Source

  1. Enhancements
  2. New linters/formatters
  3. Linters new features
    • ⚠️ Merge staticcheck, stylecheck, gosimple into one linter (staticcheck) (cf. Migration guide)
    • go-critic: from 0.12.0 to 0.13.0
    • gomodguard: from 1.3.5 to 1.4.1 (block explicit indirect dependencies)
    • nilnil: from 1.0.1 to 1.1.0 (new option: only-two)
    • perfsprint: from 0.8.2 to 0.9.1 (checker name in the diagnostic message)
    • staticcheck: new quickfix set of rules
    • testifylint: from 1.5.2 to 1.6.0 (new options: equal-values, suite-method-signature, require-string-msg)
    • wsl: from 4.5.0 to 4.6.0 (new option: allow-cuddle-used-in-block)
  4. Linters bug fixes
    • bidichk: from 0.3.2 to 0.3.3
    • errchkjson: from 0.4.0 to 0.4.1
    • errname: from 1.0.0 to 1.1.0
    • funlen: fix ignore-comments option
    • gci: from 0.13.5 to 0.13.6
    • gosmopolitan: from 1.2.2 to 1.3.0
    • inamedparam: from 0.1.3 to 0.2.0
    • intrange: from 0.3.0 to 0.3.1
    • protogetter: from 0.3.9 to 0.3.12
    • unparam: from 8a5130c to 0df0534
  5. Misc.
    • 🧹 Configuration options renaming (cf. Migration guide)
    • 🧹 Remove options (cf. Migration guide)
    • 🧹 Remove flags (cf. Migration guide)
    • 🧹 Remove alternative names (cf. Migration guide)
    • 🧹 Remove or replace deprecated elements (cf. Migration guide)
    • Adds an option to display some commands as JSON:
      • golangci-lint config path --json
      • golangci-lint help linters --json
      • golangci-lint help formatters --json
      • golangci-lint linters --json
      • golangci-lint formatters --json
      • golangci-lint version --json
  6. Documentation

v1.64.8

Compare Source

  • Detects use pf configuration files from golangci-lint v2

v1.64.7

Compare Source

  1. Linters bug fixes
    • depguard: from 2.2.0 to 2.2.1
    • dupl: from 3e9179a to f665c8d
    • gosec: from 2.22.1 to 2.22.2
    • staticcheck: from 0.6.0 to 0.6.1
  2. Documentation
    • Add GitLab documentation

v1.64.6

Compare Source

  1. Linters bug fixes
    • asciicheck: from 0.4.0 to 0.4.1
    • contextcheck: from 1.1.5 to 1.1.6
    • errcheck: from 1.8.0 to 1.9.0
    • exptostd: from 0.4.1 to 0.4.2
    • ginkgolinter: from 0.19.0 to 0.19.1
    • go-exhaustruct: from 3.3.0 to 3.3.1
    • gocheckcompilerdirectives: from 1.2.1 to 1.3.0
    • godot: from 1.4.20 to 1.5.0
    • perfsprint: from 0.8.1 to 0.8.2
    • revive: from 1.6.1 to 1.7.0
    • tagalign: from 1.4.1 to 1.4.2

v1.64.5

Compare Source

  1. Bug fixes
    • Add missing flag new-from-merge-base-flag
  2. Linters bug fixes
    • asciicheck: from 0.3.0 to 0.4.0
    • forcetypeassert: from 0.1.0 to 0.2.0
    • gosec: from 2.22.0 to 2.22.1

v1.64.4

Compare Source

  1. Linters bug fixes
    • gci: fix standard packages list for go1.24

v1.64.3

Compare Source

  1. Linters bug fixes
    • ginkgolinter: from 0.18.4 to 0.19.0
    • go-critic: from 0.11.5 to 0.12.0
    • revive: from 1.6.0 to 1.6.1
    • gci: fix standard packages list for go1.24
  2. Misc.
    • Build Docker images with go1.24

v1.64.2

Compare Source

This is the last minor release of golangci-lint v1.
The next release will be golangci-lint v2.

  1. Enhancements
    • 🎉 go1.24 support
    • New issues.new-from-merge-base option
    • New run.relative-path-mode option
  2. Linters new features
    • copyloopvar: from 1.1.0 to 1.2.1 (support suggested fixes)
    • exptostd: from 0.3.1 to 0.4.1 (handles golang.org/x/exp/constraints.Ordered)
    • fatcontext: from 0.5.3 to 0.7.1 (new option: check-struct-pointers)
    • perfsprint: from 0.7.1 to 0.8.1 (new options: integer-format, error-format, string-format, bool-format, and hex-format)
    • revive: from 1.5.1 to 1.6.0 (new rules: redundant-build-tag, use-errors-new. New option early-return.early-return)
  3. Linters bug fixes
    • go-errorlint: from 1.7.0 to 1.7.1
    • gochecknoglobals: from 0.2.1 to 0.2.2
    • godox: from 006bad1 to 1.1.0
    • gosec: from 2.21.4 to 2.22.0
    • iface: from 1.3.0 to 1.3.1
    • nilnesserr: from 0.1.1 to 0.1.2
    • protogetter: from 0.3.8 to 0.3.9
    • sloglint: from 0.7.2 to 0.9.0
    • spancheck: fix default StartSpanMatchersSlice values
    • staticcheck: from 0.5.1 to 0.6.0
  4. Deprecations
    • ⚠️ tenv is deprecated and replaced by usetesting.os-setenv: true.
  5. Misc.
    • Sanitize severities by output format
    • Avoid panic with plugin without description
  6. Documentation
    • Clarify depguard configuration

Configuration

📅 Schedule: Branch creation - "* 8 1 * *" in timezone Australia/Sydney, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the patch label Mar 31, 2025
@renovate renovate bot requested a review from tim-thacker-nullify as a code owner March 31, 2025 21:58
@nullify-latest
Copy link

Nullify Container Vulnerabilities

Container vulnerabilities occur due to misconfigurations, outdated software, or unpatched security flaws in containerized applications.

Severity Threshold: 🔵 MEDIUM

45 Vulnerabilities found in image: golangci/golangci-lint:v2.0.2@sha256:d55581f7797e7a0877a7c3aaa399b01bdc57d2874d6412601a046cc4062cb62e

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
45 2 14 29 0

FROM golangci/golangci-lint:v2.0.2@sha256:d55581f7797e7a0877a7c3aaa399b01bdc57d2874d6412601a046cc4062cb62e as golangci-lint

View Vulnerable Packages

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-10524 MEDIUM 6.50 3.70 2.20
CVE-2021-31879 MEDIUM 6.10 2.70 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:python3.11 Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-50602 MEDIUM 5.90 3.60 2.20

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-base Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:curl Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libcurl3-gnutls Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libcurl4 Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libgcrypt20 Version: 1.10.1-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-2236 MEDIUM 5.90 3.60 2.20

Package: debian:libncursesw6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libtinfo6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:login Version: 1:4.13+dfsg1-1+b1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:ncurses-base Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:ncurses-bin Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:passwd Version: 1:4.13+dfsg1-1+b1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Alternative Images

golangci/golangci-lint:latest@sha256:d55581f7797e7a0877a7c3aaa399b01bdc57d2874d6412601a046cc4062cb62e

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
45 2 14 29 0
View Vulnerable Packages

Package: debian:wget Version: 1.21.3-1+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-38428 CRITICAL 9.10 5.20 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
CVE-2024-10524 MEDIUM 6.50 3.70 2.20
CVE-2021-31879 MEDIUM 6.10 2.70 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Package: debian:zlib1g Version: 1:1.2.13.dfsg-1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
1 0 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-45853 CRITICAL 9.80 5.90 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:libpam-modules Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-modules-bin Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam-runtime Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpam0g Version: 1.5.2-6+deb12u1 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-10963 HIGH 7.40 5.20 2.20
CVE-2024-22365 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2024-10041 MEDIUM 4.70 3.60 1.00

Package: debian:libpython3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libpython3.11-stdlib Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:python3.11 Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:python3.11-minimal Version: 3.11.2-6+deb12u5 Vulnerabilities: 3

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 2 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-7592 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-6923 MEDIUM 5.50 3.40 2.10
CVE-2023-27043 MEDIUM 5.30 1.40 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Package: debian:libexpat1 Version: 2.5.0-1+deb12u1 Vulnerabilities: 2

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-52425 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2024-50602 MEDIUM 5.90 3.60 2.20

Package: debian:libldap-2.5-0 Version: 2.5.13+dfsg-5 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-2953 HIGH 7.50 3.60 3.90 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Package: debian:libperl5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-base Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:perl-modules-5.36 Version: 5.36.0-7+deb12u1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 1 0 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-31484 HIGH 8.10 5.90 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Package: debian:curl Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libcurl3-gnutls Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libcurl4 Version: 7.88.1-10+deb12u12 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-9681 MEDIUM 6.50 4.20 2.20 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Package: debian:libgcrypt20 Version: 1.10.1-3 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2024-2236 MEDIUM 5.90 3.60 2.20

Package: debian:libncursesw6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:libtinfo6 Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:login Version: 1:4.13+dfsg1-1+b1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Package: debian:ncurses-base Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:ncurses-bin Version: 6.4-4 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-50495 MEDIUM 6.50 3.60 2.80 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Package: debian:passwd Version: 1:4.13+dfsg1-1+b1 Vulnerabilities: 1

View Vulnerabilities (CVEs)
🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 1 0
CVE Severity CVSS Impact Score ExploitabilityScore Vector String
CVE-2023-4641 MEDIUM 5.50 3.60 1.80 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

golangci/golangci-lint:v2.0.2-alpine@sha256:53416810ed467f3ef6e63007bd5992cef833883f62ad0109c6a475f1f210dec4

Total Vulnerabilities 🔴 CRITICAL 🟡 HIGH 🔵 MEDIUM ⚪ LOW
0 0 0 0 0

@tim-thacker-nullify tim-thacker-nullify added this pull request to the merge queue Mar 31, 2025
Merged via the queue into main with commit 32e6f67 Mar 31, 2025
8 checks passed
@tim-thacker-nullify tim-thacker-nullify deleted the renovate/package-updates branch March 31, 2025 22:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants