Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 5, 2026

This PR contains the following updates:

Package Type Update Change Age Confidence
actions/checkout action patch v6.0.1v6.0.2 age confidence
actions/setup-dotnet action minor v5.0.1v5.1.0 age confidence
actions/setup-java action minor v5.1.0v5.2.0 age confidence
actions/setup-node action minor v6.1.0v6.2.0 age confidence
astral-sh/setup-uv action minor v7.1.6v7.2.0 age confidence
docker/login-action action minor v3.6.0v3.7.0 age confidence
github/codeql-action action minor v4.31.9v4.32.0 age confidence
gradle/actions action patch v5.0.0v5.0.1 age confidence
oxsecurity/megalinter action minor v9.2.0v9.3.0 age confidence
step-security/harden-runner action patch v2.14.0v2.14.1 age confidence
zizmor (source) minor 1.19.01.22.0 age confidence

Release Notes

actions/checkout (actions/checkout)

v6.0.2

Compare Source

actions/setup-dotnet (actions/setup-dotnet)

v5.1.0

Compare Source

What's Changed
Documentation
Dependency updates
New Contributors

Full Changelog: actions/setup-dotnet@v5...v5.1.0

actions/setup-java (actions/setup-java)

v5.2.0

Compare Source

What's Changed
Enhancement
Documentation Changes
Dependency Updates
New Contributors

Full Changelog: actions/setup-java@v5...v5.2.0

actions/setup-node (actions/setup-node)

v6.2.0

Compare Source

astral-sh/setup-uv (astral-sh/setup-uv)

v7.2.0: 🌈 add outputs python-version and python-cache-hit

Compare Source

Changes

Among some minor typo fixes and quality of life features for developers of actions the main feature of this release are new outputs:

  • python-version: The Python version that was set (same content as existing UV_PYTHON)
  • python-cache-hit: A boolean value to indicate the Python cache entry was found

While implementing this it became clear, that it is easier to handle the Python binaries in a separate cache entry. The added benefit for users is that the "normal" cache containing the dependencies can be used in all runs no matter if these cache the Python binaries or not.

[!NOTE]
This release will invalidate caches that contain the Python binaries. This happens a single time.

🐛 Bug fixes
  • chore: remove stray space from UV_PYTHON_INSTALL_DIR message @​akx (#​720)
🚀 Enhancements
🧰 Maintenance
⬆️ Dependency updates
docker/login-action (docker/login-action)

v3.7.0

Compare Source

github/codeql-action (github/codeql-action)

v4.32.0

Compare Source

v4.31.11

Compare Source

  • When running a Default Setup workflow with Actions debugging enabled, the CodeQL Action will now use more unique names when uploading logs from the Dependabot authentication proxy as workflow artifacts. This ensures that the artifact names do not clash between multiple jobs in a build matrix. #​3409
  • Improved error handling throughout the CodeQL Action. #​3415
  • Added experimental support for automatically excluding generated files from the analysis. This feature is not currently enabled for any analysis. In the future, it may be enabled by default for some GitHub-managed analyses. #​3318
  • The changelog extracts that are included with releases of the CodeQL Action are now shorter to avoid duplicated information from appearing in Dependabot PRs. #​3403

v4.31.10

Compare Source

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

4.31.10 - 12 Jan 2026
  • Update default CodeQL bundle version to 2.23.9. #​3393

See the full CHANGELOG.md for more information.

gradle/actions (gradle/actions)

v5.0.1

Compare Source

oxsecurity/megalinter (oxsecurity/megalinter)

v9.3.0

Compare Source

step-security/harden-runner (step-security/harden-runner)

v2.14.1

Compare Source

What's Changed
  1. In some self-hosted environments, the agent could briefly fall back to public DNS resolvers during startup if the system DNS was not yet available. This behavior was unintended for GitHub-hosted runners and has now been fixed to prevent any use of public DNS resolvers.

  2. Fixed npm audit vulnerabilities

Full Changelog: step-security/harden-runner@v2.14.0...v2.14.1

zizmorcore/zizmor (zizmor)

v1.22.0

Compare Source

Changes ⚠️🔗

  • The misfeature audit now only shows non-"well known" shell: findings when running with the "auditor" persona (#​1532)

Bug Fixes 🐛🔗

  • Fixed a bug where inputs containing CRLF line endings were not patched correctly by the unpinned-uses audit (#​1536)

v1.21.0

Compare Source

New Features 🌈🔗

  • New audit: misfeature detects usage of GitHub Actions features that are considered "misfeatures." (#​1517)

Enhancements 🌱🔗

  • zizmor now uses exit code 3 to signal an audit that has failed because no input files were collected. See the exit code documentation for details (#​1515)

  • The unpinned-uses audit now supports auto-fixes for many findings (#​1525)

Changes ⚠️🔗

  • The obfuscation audit no longer flags shell: cmd. That check has been moved to the new misfeature audit. Users may need to update their ignore comments and/or configuration (#​1517)

Bug Fixes 🐛🔗

v1.20.0

Compare Source

Enhancements 🌱🔗

Changes ⚠️🔗

  • The default policy for the unpinned-uses audit has changed from allowing ref-pinning for first-party actions (those under actions/* and similar) to requiring hash-pinning. This makes the default policy more strict, as well as more consistent across the actions ecosystem.

    Users who with to retain the old (permissive policy) for first-party actions may configure it explicitly in their zizmor.yml:

zizmor.yml

rules:
  unpinned-uses:
    config:
      policies:
        actions/*: ref-pin
        github/*: ref-pin
        dependabot/*: ref-pin

Bug Fixes 🐛🔗

  • The dependabot-cooldown audit no longer flags missing cooldowns on ecosystems that don't (yet) support cooldowns, such as opentofu (#​1480)

  • Fixed a false positive in the cache-poisoning audit where zizmor would treat empty strings (e.g. cache: '') as enabling rather than disabling caching (#​1482)

  • Fixed two gaps in the use-trusted-publishing audit's detection of common yarn publishing commands (#​1495)

Miscellaneous 🛠🔗

  • zizmor's configuration now has an official JSON schema that will be available via SchemaStore soon!

    Many thanks to @​kiwamizamurai for implementing this improvement!


Configuration

📅 Schedule: Branch creation - Between 12:00 AM and 03:59 AM, only on Monday ( * 0-3 * * 1 ) (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@github-actions
Copy link
Contributor

github-actions bot commented Jan 5, 2026

MegaLinter analysis: Error

Descriptor Linter Files Fixed Errors Warnings Elapsed time
✅ ACTION actionlint 4 0 0 0.56s
✅ COPYPASTE jscpd yes no no 1.32s
✅ DOCKERFILE hadolint 1 0 0 0.15s
✅ JSON jsonlint 3 0 0 0.27s
✅ JSON prettier 3 0 0 0.64s
✅ JSON v8r 3 0 0 2.53s
✅ MARKDOWN markdownlint 1 0 0 0.59s
✅ MARKDOWN markdown-table-formatter 1 0 0 0.28s
✅ PYTHON bandit 1 0 0 3.2s
✅ PYTHON black 1 0 0 0.84s
✅ PYTHON flake8 1 0 0 0.52s
✅ PYTHON isort 1 0 0 0.23s
✅ PYTHON mypy 1 0 0 3.41s
✅ PYTHON pylint 1 0 0 2.7s
✅ PYTHON pyright 1 0 0 1.87s
✅ PYTHON ruff 1 0 0 0.03s
✅ REPOSITORY checkov yes no no 25.05s
✅ REPOSITORY dustilock yes no no 0.03s
✅ REPOSITORY gitleaks yes no no 0.38s
✅ REPOSITORY git_diff yes no no 0.01s
✅ REPOSITORY grype yes no no 38.77s
✅ REPOSITORY kics yes no no 3.85s
❌ REPOSITORY kingfisher yes 1 1 5.01s
✅ REPOSITORY secretlint yes no no 1.35s
✅ REPOSITORY syft yes no no 2.08s
✅ REPOSITORY trivy yes no no 11.71s
✅ REPOSITORY trivy-sbom yes no no 0.1s
✅ REPOSITORY trufflehog yes no no 3.69s
✅ YAML prettier 6 0 0 0.69s
✅ YAML v8r 6 0 0 5.71s
✅ YAML yamllint 6 0 0 0.64s

Detailed Issues

❌ REPOSITORY / kingfisher - 1 error
warning: Rule GitHub Secret Key matched ./.github/workflows/standard-release.yaml
   ┌─ ./.github/workflows/standard-release.yaml:46:46
   │
46 │       - uses: actions/create-github-app-token@HIDDEN_BY_MEGALINTER# v2.2.1
   │                                              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

warning: 1 warnings emitted

See detailed reports in MegaLinter artifacts

Your project could benefit from a custom flavor, which would allow you to run only the linters you need, and thus improve runtime performances. (Skip this info by defining FLAVOR_SUGGESTIONS: false)

  • Documentation: Custom Flavors
  • Command: npx mega-linter-runner@9.3.0 --custom-flavor-setup --custom-flavor-linters PYTHON_PYLINT,PYTHON_BLACK,PYTHON_FLAKE8,PYTHON_ISORT,PYTHON_BANDIT,PYTHON_MYPY,PYTHON_PYRIGHT,PYTHON_RUFF,ACTION_ACTIONLINT,COPYPASTE_JSCPD,DOCKERFILE_HADOLINT,JSON_JSONLINT,JSON_V8R,JSON_PRETTIER,MARKDOWN_MARKDOWNLINT,MARKDOWN_MARKDOWN_TABLE_FORMATTER,REPOSITORY_CHECKOV,REPOSITORY_DUSTILOCK,REPOSITORY_GIT_DIFF,REPOSITORY_GITLEAKS,REPOSITORY_GRYPE,REPOSITORY_KICS,REPOSITORY_SECRETLINT,REPOSITORY_SYFT,REPOSITORY_TRIVY,REPOSITORY_TRIVY_SBOM,REPOSITORY_TRUFFLEHOG,REPOSITORY_KINGFISHER,YAML_PRETTIER,YAML_YAMLLINT,YAML_V8R

MegaLinter is graciously provided by OX Security

@github-advanced-security
Copy link

This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation.

@renovate renovate bot force-pushed the renovate/all-minor-patch branch 2 times, most recently from eabc94b to d4a268e Compare January 6, 2026 05:59
@renovate renovate bot changed the title chore(deps): update oxsecurity/megalinter action to v9.3.0 chore(deps): update all non-major dependencies Jan 6, 2026
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 2 times, most recently from 69234c6 to 2d86663 Compare January 12, 2026 16:52
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 5 times, most recently from 0629740 to e0f79ae Compare January 19, 2026 05:29
@renovate renovate bot force-pushed the renovate/all-minor-patch branch 6 times, most recently from 20c4d22 to c722b5f Compare January 28, 2026 13:15
@renovate renovate bot force-pushed the renovate/all-minor-patch branch from c722b5f to ae34964 Compare January 28, 2026 22:25
@github-actions
Copy link
Contributor

Trivy image scan report

ghcr.io/chgl/github-reusable-workflow-without-test-image:pr-219 (debian 13.3)

36 known vulnerabilities found (CRITICAL: 3 HIGH: 3 MEDIUM: 30 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3t64 CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

@github-actions
Copy link
Contributor

Trivy image scan report

ghcr.io/chgl/github-reusable-workflow-with-fixed-image-tags:v1.2.3-beta.123 (debian 13.3)

36 known vulnerabilities found (LOW: 0 CRITICAL: 3 HIGH: 3 MEDIUM: 30)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3t64 CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

@github-actions
Copy link
Contributor

Trivy image scan report

ghcr.io/chgl/github-reusable-workflow:pr-219 (debian 13.3)

36 known vulnerabilities found (CRITICAL: 3 HIGH: 3 MEDIUM: 30 LOW: 0)

Show detailed table of vulnerabilities
Package ID Severity Installed Version Fixed Version
libssl3t64 CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
libssl3t64 CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15467 CRITICAL 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69419 HIGH 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-11187 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15468 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-15469 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-66199 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-68160 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69418 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69420 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2025-69421 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22795 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2
openssl-provider-legacy CVE-2026-22796 MEDIUM 3.5.4-1~deb13u1 3.5.4-1~deb13u2

No Misconfigurations found

Python

No Vulnerabilities found

No Misconfigurations found

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants