Skip to content

deps(deps): update ansible/ansible-lint action to v25.4.0 #85

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Apr 2, 2025

This PR contains the following updates:

Package Type Update Change
ansible/ansible-lint action minor v25.1.3 -> v25.4.0

Release Notes

ansible/ansible-lint (ansible/ansible-lint)

v25.4.0

Compare Source

Bugfixes

v25.2.1

Compare Source

Bugfixes

v25.2.0

Compare Source

Enhancements

Bugfixes


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from lotyp as a code owner April 2, 2025 14:58
@renovate renovate bot enabled auto-merge (squash) April 2, 2025 14:58
@github-actions github-actions bot added the type: maintenance For maintenance, refactor and testing (perf, chore, style, revert, refactor, test, build, ci) label Apr 2, 2025
Copy link
Contributor

github-actions bot commented Apr 2, 2025

Outdated

🔍 Vulnerabilities of moby/buildkit:buildx-stable-1

📦 Image Reference moby/buildkit:buildx-stable-1
digestsha256:3c2d380153442abef80c4a7bd144af682eb264b748e1bea93b7d3f76ca7e0d62
vulnerabilitiescritical: 0 high: 6 medium: 0 low: 0
platformlinux/amd64
size104 MB
packages244
📦 Base Image alpine:3
also known as
  • 3.21
  • 3.21.3
  • latest
digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
critical: 0 high: 4 medium: 0 low: 0 stdlib 1.22.4 (golang)

pkg:golang/[email protected]

high : CVE--2024--34158

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.033%
EPSS Percentile6th percentile
Description

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

high : CVE--2024--34156

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.073%
EPSS Percentile19th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

high : CVE--2024--24791

Affected range>=1.22.0-0
<1.22.5
Fixed version1.22.5
EPSS Score0.203%
EPSS Percentile40th percentile
Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

high : CVE--2022--30635

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.123%
EPSS Percentile28th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

critical: 0 high: 1 medium: 0 low: 0 golang.org/x/crypto 0.31.0 (golang)

pkg:golang/golang.org/x/[email protected]

high : CVE--2025--22869

Affected range<0.35.0
Fixed version0.35.0
EPSS Score0.090%
EPSS Percentile23rd percentile
Description

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

critical: 0 high: 1 medium: 0 low: 0 github.com/golang-jwt/jwt/v5 5.2.1 (golang)

pkg:golang/github.com/golang-jwt/[email protected]#v5

high 8.7: CVE--2025--30204 Asymmetric Resource Consumption (Amplification)

Affected range>=5.0.0-rc.1
<5.2.2
Fixed version5.2.2
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Score0.055%
EPSS Percentile14th percentile
Description

Summary

Function parse.ParseUnverified currently splits (via a call to strings.Split) its argument (which is untrusted data) on periods.

As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Details

See parse.ParseUnverified

Impact

Excessive memory allocation

Copy link
Contributor

github-actions bot commented Apr 2, 2025

Outdated

Recommended fixes for image moby/buildkit:buildx-stable-1

Base image is alpine:3

Name3.21.3
Digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 month ago
Size3.6 MB
Packages19
OS3.21.3
The base image is also available under the supported tag(s): 3.21, 3.21.3, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

✅ There are no tag recommendations at this time.

Copy link
Contributor

github-actions bot commented Apr 2, 2025

Outdated

🔍 Vulnerabilities of moby/buildkit:buildx-stable-1

📦 Image Reference moby/buildkit:buildx-stable-1
digestsha256:3c2d380153442abef80c4a7bd144af682eb264b748e1bea93b7d3f76ca7e0d62
vulnerabilitiescritical: 0 high: 6 medium: 0 low: 0
platformlinux/amd64
size104 MB
packages244
📦 Base Image alpine:3
also known as
  • 3.21
  • 3.21.3
  • latest
digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
critical: 0 high: 4 medium: 0 low: 0 stdlib 1.22.4 (golang)

pkg:golang/[email protected]

high : CVE--2024--34158

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.033%
EPSS Percentile6th percentile
Description

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

high : CVE--2024--34156

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.073%
EPSS Percentile19th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

high : CVE--2024--24791

Affected range>=1.22.0-0
<1.22.5
Fixed version1.22.5
EPSS Score0.203%
EPSS Percentile40th percentile
Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

high : CVE--2022--30635

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.123%
EPSS Percentile28th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

critical: 0 high: 1 medium: 0 low: 0 github.com/golang-jwt/jwt/v5 5.2.1 (golang)

pkg:golang/github.com/golang-jwt/[email protected]#v5

high 8.7: CVE--2025--30204 Asymmetric Resource Consumption (Amplification)

Affected range>=5.0.0-rc.1
<5.2.2
Fixed version5.2.2
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Score0.055%
EPSS Percentile14th percentile
Description

Summary

Function parse.ParseUnverified currently splits (via a call to strings.Split) its argument (which is untrusted data) on periods.

As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Details

See parse.ParseUnverified

Impact

Excessive memory allocation

critical: 0 high: 1 medium: 0 low: 0 golang.org/x/crypto 0.31.0 (golang)

pkg:golang/golang.org/x/[email protected]

high : CVE--2025--22869

Affected range<0.35.0
Fixed version0.35.0
EPSS Score0.090%
EPSS Percentile23rd percentile
Description

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

Copy link
Contributor

github-actions bot commented Apr 2, 2025

Outdated

Recommended fixes for image moby/buildkit:buildx-stable-1

Base image is alpine:3

Name3.21.3
Digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 month ago
Size3.6 MB
Packages19
OS3.21.3
The base image is also available under the supported tag(s): 3.21, 3.21.3, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

✅ There are no tag recommendations at this time.

@renovate renovate bot changed the title deps(deps): update ansible/ansible-lint action to v25.2.0 deps(deps): update ansible/ansible-lint action to v25.2.1 Apr 3, 2025
@renovate renovate bot force-pushed the renovate/ansible-ansible-lint-25.x branch from c0c12e4 to 6d6e799 Compare April 3, 2025 13:54
Copy link
Contributor

github-actions bot commented Apr 3, 2025

Outdated

🔍 Vulnerabilities of moby/buildkit:buildx-stable-1

📦 Image Reference moby/buildkit:buildx-stable-1
digestsha256:3c2d380153442abef80c4a7bd144af682eb264b748e1bea93b7d3f76ca7e0d62
vulnerabilitiescritical: 0 high: 6 medium: 0 low: 0
platformlinux/amd64
size104 MB
packages244
📦 Base Image alpine:3
also known as
  • 3.21
  • 3.21.3
  • latest
digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
critical: 0 high: 4 medium: 0 low: 0 stdlib 1.22.4 (golang)

pkg:golang/[email protected]

high : CVE--2024--34158

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.038%
EPSS Percentile8th percentile
Description

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

high : CVE--2024--34156

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.083%
EPSS Percentile22nd percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

high : CVE--2024--24791

Affected range>=1.22.0-0
<1.22.5
Fixed version1.22.5
EPSS Score0.203%
EPSS Percentile40th percentile
Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

high : CVE--2022--30635

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.123%
EPSS Percentile29th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

critical: 0 high: 1 medium: 0 low: 0 golang.org/x/crypto 0.31.0 (golang)

pkg:golang/golang.org/x/[email protected]

high : CVE--2025--22869

Affected range<0.35.0
Fixed version0.35.0
EPSS Score0.090%
EPSS Percentile23rd percentile
Description

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

critical: 0 high: 1 medium: 0 low: 0 github.com/golang-jwt/jwt/v5 5.2.1 (golang)

pkg:golang/github.com/golang-jwt/[email protected]#v5

high 8.7: CVE--2025--30204 Asymmetric Resource Consumption (Amplification)

Affected range>=5.0.0-rc.1
<5.2.2
Fixed version5.2.2
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Score0.055%
EPSS Percentile14th percentile
Description

Summary

Function parse.ParseUnverified currently splits (via a call to strings.Split) its argument (which is untrusted data) on periods.

As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Details

See parse.ParseUnverified

Impact

Excessive memory allocation

Copy link
Contributor

github-actions bot commented Apr 3, 2025

Outdated

Recommended fixes for image moby/buildkit:buildx-stable-1

Base image is alpine:3

Name3.21.3
Digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 month ago
Size3.6 MB
Packages19
OS3.21.3
The base image is also available under the supported tag(s): 3.21, 3.21.3, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

✅ There are no tag recommendations at this time.

Copy link
Contributor

github-actions bot commented Apr 3, 2025

Outdated

🔍 Vulnerabilities of moby/buildkit:buildx-stable-1

📦 Image Reference moby/buildkit:buildx-stable-1
digestsha256:3c2d380153442abef80c4a7bd144af682eb264b748e1bea93b7d3f76ca7e0d62
vulnerabilitiescritical: 0 high: 6 medium: 0 low: 0
platformlinux/amd64
size104 MB
packages244
📦 Base Image alpine:3
also known as
  • 3.21
  • 3.21.3
  • latest
digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
critical: 0 high: 4 medium: 0 low: 0 stdlib 1.22.4 (golang)

pkg:golang/[email protected]

high : CVE--2024--34158

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.038%
EPSS Percentile8th percentile
Description

Calling Parse on a "// +build" build tag line with deeply nested expressions can cause a panic due to stack exhaustion.

high : CVE--2024--34156

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.083%
EPSS Percentile22nd percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

high : CVE--2024--24791

Affected range>=1.22.0-0
<1.22.5
Fixed version1.22.5
EPSS Score0.203%
EPSS Percentile40th percentile
Description

The net/http HTTP/1.1 client mishandled the case where a server responds to a request with an "Expect: 100-continue" header with a non-informational (200 or higher) status. This mishandling could leave a client connection in an invalid state, where the next request sent on the connection will fail.

An attacker sending a request to a net/http/httputil.ReverseProxy proxy can exploit this mishandling to cause a denial of service by sending "Expect: 100-continue" requests which elicit a non-informational response from the backend. Each such request leaves the proxy with an invalid connection, and causes one subsequent request using that connection to fail.

high : CVE--2022--30635

Affected range<1.22.7
Fixed version1.22.7
EPSS Score0.123%
EPSS Percentile29th percentile
Description

Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.

critical: 0 high: 1 medium: 0 low: 0 golang.org/x/crypto 0.31.0 (golang)

pkg:golang/golang.org/x/[email protected]

high : CVE--2025--22869

Affected range<0.35.0
Fixed version0.35.0
EPSS Score0.090%
EPSS Percentile23rd percentile
Description

SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.

critical: 0 high: 1 medium: 0 low: 0 github.com/golang-jwt/jwt/v5 5.2.1 (golang)

pkg:golang/github.com/golang-jwt/[email protected]#v5

high 8.7: CVE--2025--30204 Asymmetric Resource Consumption (Amplification)

Affected range>=5.0.0-rc.1
<5.2.2
Fixed version5.2.2
CVSS Score8.7
CVSS VectorCVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS Score0.055%
EPSS Percentile14th percentile
Description

Summary

Function parse.ParseUnverified currently splits (via a call to strings.Split) its argument (which is untrusted data) on periods.

As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. Relevant weakness: CWE-405: Asymmetric Resource Consumption (Amplification)

Details

See parse.ParseUnverified

Impact

Excessive memory allocation

Copy link
Contributor

github-actions bot commented Apr 3, 2025

Outdated

Recommended fixes for image moby/buildkit:buildx-stable-1

Base image is alpine:3

Name3.21.3
Digestsha256:1c4eef651f65e2f7daee7ee785882ac164b02b78fb74503052a26dc061c90474
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 month ago
Size3.6 MB
Packages19
OS3.21.3
The base image is also available under the supported tag(s): 3.21, 3.21.3, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

✅ There are no tag recommendations at this time.

@renovate renovate bot changed the title deps(deps): update ansible/ansible-lint action to v25.2.1 deps(deps): update ansible/ansible-lint action to v25.4.0 Apr 28, 2025
@renovate renovate bot force-pushed the renovate/ansible-ansible-lint-25.x branch from 6d6e799 to f1a9a90 Compare April 28, 2025 16:43
Copy link
Contributor

github-actions bot commented Apr 28, 2025

Outdated

🔍 Vulnerabilities of wayofdev/nginx:latest

📦 Image Reference wayofdev/nginx:latest
digestsha256:90195a0f6323cc4c0c1763446d313d39d6e257b527a48a43cbcd7cfd9a505dc6
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
platformlinux/amd64
size26 MB
packages83
📦 Base Image nginx:1-alpine
also known as
  • 1-alpine3.21
  • 1.27-alpine
  • 1.27-alpine3.21
  • 1.27.5-alpine
  • 1.27.5-alpine3.21
  • alpine
  • alpine3.21
  • mainline-alpine
  • mainline-alpine3.21
digestsha256:62223d644fa234c3a1cc785ee14242ec47a77364226f1c811d2f669f96dc2ac8
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0

Copy link
Contributor

github-actions bot commented Apr 28, 2025

Outdated

Recommended fixes for image wayofdev/nginx:latest

Base image is nginx:1-alpine

Name1.27.5-alpine
Digestsha256:62223d644fa234c3a1cc785ee14242ec47a77364226f1c811d2f669f96dc2ac8
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 week ago
Size21 MB
Packages83
Flavoralpine
Runtime1.27.5
The base image is also available under the supported tag(s): 1-alpine3.21, 1.27-alpine, 1.27-alpine3.21, 1.27.5-alpine, 1.27.5-alpine3.21, alpine, alpine3.21, mainline-alpine, mainline-alpine3.21

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

TagDetailsPushedVulnerabilities
1-alpine-slim
Minor runtime version update
Also known as:
  • 1.27.5-alpine-slim
  • 1.27-alpine-slim
  • alpine3.21-slim
  • 1-alpine3.21-slim
  • mainline-alpine-slim
  • 1.27-alpine3.21-slim
  • 1.27.5-alpine3.21-slim
  • mainline-alpine3.21-slim
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Image is smaller by 15 MB
  • Image contains 58 fewer packages
  • Image has same number of vulnerabilities
  • Tag is using slim variant
  • 1-alpine-slim was pulled 215K times last month
Image details:
  • Size: 5.4 MB
  • Flavor: alpine
  • Runtime: 1.27.5
1 week ago



1.28-alpine
Minor runtime version update
Also known as:
  • 1.28.0-alpine
  • stable-alpine
  • 1.28-alpine3.21
  • stable-alpine3.21
  • 1.28.0-alpine3.21
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Image is smaller by 135 B
  • Tag was pushed more recently
  • Image has same number of vulnerabilities
  • Image contains equal number of packages
Image details:
  • Size: 21 MB
  • Flavor: alpine
  • Runtime: 1.28.0
4 days ago



Copy link
Contributor

🔍 Vulnerabilities of wayofdev/nginx:latest

📦 Image Reference wayofdev/nginx:latest
digestsha256:79196656d50812c8ab648241ac7682e14c0747fcb8ef51d342210874bb6bec5e
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
platformlinux/amd64
size26 MB
packages83
📦 Base Image nginx:1-alpine
also known as
  • 1-alpine3.21
  • 1.27-alpine
  • 1.27-alpine3.21
  • 1.27.5-alpine
  • 1.27.5-alpine3.21
  • alpine
  • alpine3.21
  • mainline-alpine
  • mainline-alpine3.21
digestsha256:62223d644fa234c3a1cc785ee14242ec47a77364226f1c811d2f669f96dc2ac8
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0

Copy link
Contributor

Recommended fixes for image wayofdev/nginx:latest

Base image is nginx:1-alpine

Name1.27.5-alpine
Digestsha256:62223d644fa234c3a1cc785ee14242ec47a77364226f1c811d2f669f96dc2ac8
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed1 week ago
Size21 MB
Packages83
Flavoralpine
Runtime1.27.5
The base image is also available under the supported tag(s): 1-alpine3.21, 1.27-alpine, 1.27-alpine3.21, 1.27.5-alpine, 1.27.5-alpine3.21, alpine, alpine3.21, mainline-alpine, mainline-alpine3.21

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

TagDetailsPushedVulnerabilities
1-alpine-slim
Minor runtime version update
Also known as:
  • 1.27.5-alpine-slim
  • 1.27-alpine-slim
  • alpine3.21-slim
  • 1-alpine3.21-slim
  • mainline-alpine-slim
  • 1.27-alpine3.21-slim
  • 1.27.5-alpine3.21-slim
  • mainline-alpine3.21-slim
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Image is smaller by 15 MB
  • Image contains 58 fewer packages
  • Image has same number of vulnerabilities
  • Tag is using slim variant
  • 1-alpine-slim was pulled 215K times last month
Image details:
  • Size: 5.4 MB
  • Flavor: alpine
  • Runtime: 1.27.5
1 week ago



1.28-alpine
Minor runtime version update
Also known as:
  • 1.28.0-alpine
  • stable-alpine
  • 1.28-alpine3.21
  • stable-alpine3.21
  • 1.28.0-alpine3.21
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Image is smaller by 135 B
  • Tag was pushed more recently
  • Image has same number of vulnerabilities
  • Image contains equal number of packages
Image details:
  • Size: 21 MB
  • Flavor: alpine
  • Runtime: 1.28.0
4 days ago



Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type: maintenance For maintenance, refactor and testing (perf, chore, style, revert, refactor, test, build, ci)
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants