Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 18, 2025

Bumps the action-deps group with 9 updates in the / directory:

Package From To
step-security/harden-runner 2.12.0 2.12.1
github/codeql-action 3.28.19 3.29.0
sigstore/cosign-installer 3.8.2 3.9.0
docker/setup-buildx-action 3.10.0 3.11.0
anchore/sbom-action 0.20.0 0.20.1
actions/attest-sbom 2.2.0 2.4.0
actions/attest-build-provenance 2.3.0 2.4.0
anchore/scan-action 6.2.0 6.3.0
dawidd6/action-download-artifact 10 11

Updates step-security/harden-runner from 2.12.0 to 2.12.1

Release notes

Sourced from step-security/harden-runner's releases.

v2.12.1

What's Changed

  • Detection capabilities have been upgraded to better recognize attempts at runner tampering. These improvements are informed by real-world incident learnings, including analysis of anomalous behaviors observed in the tj-actions and reviewdog supply chain attack.
  • Resolved an issue where the block policy was not enforced correctly when the GitHub Actions job was running inside a container on a self-hosted VM runner.

Full Changelog: step-security/harden-runner@v2...v2.12.1

Commits
  • 002fdce Merge pull request #544 from step-security/rc-21
  • 2489e3f Merge branch 'main' into rc-21
  • 75dd441 Merge pull request #555 from step-security/dependabot/github_actions/step-sec...
  • 4381ace Bump step-security/publish-unit-test-result-action from 2.19.0 to 2.20.0
  • a9da90b Merge pull request #553 from h0x0er/feat/container-workflows
  • a60ef21 update
  • 4ad512f Merge branch 'rc-21' into feat/container-workflows
  • 6b41a39 fixed test case
  • fa70c45 update agent
  • eb47845 self-hosted: refactored block-policy apply logic
  • Additional commits viewable in compare view

Updates github/codeql-action from 3.28.19 to 3.29.0

Release notes

Sourced from github/codeql-action's releases.

v3.29.0

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

3.29.0 - 11 Jun 2025

  • Update default CodeQL bundle version to 2.22.0. #2925
  • Bump minimum CodeQL bundle version to 2.16.6. #2912

See the full CHANGELOG.md for more information.

Changelog

Sourced from github/codeql-action's changelog.

CodeQL Action Changelog

See the releases page for the relevant changes to the CodeQL CLI and language packs.

[UNRELEASED]

No user facing changes.

3.29.0 - 11 Jun 2025

  • Update default CodeQL bundle version to 2.22.0. #2925
  • Bump minimum CodeQL bundle version to 2.16.6. #2912

3.28.19 - 03 Jun 2025

  • The CodeQL Action no longer includes its own copy of the extractor for the actions language, which is currently in public preview. The actions extractor has been included in the CodeQL CLI since v2.20.6. If your workflow has enabled the actions language and you have pinned your tools: property to a specific version of the CodeQL CLI earlier than v2.20.6, you will need to update to at least CodeQL v2.20.6 or disable actions analysis.
  • Update default CodeQL bundle version to 2.21.4. #2910

3.28.18 - 16 May 2025

  • Update default CodeQL bundle version to 2.21.3. #2893
  • Skip validating SARIF produced by CodeQL for improved performance. #2894
  • The number of threads and amount of RAM used by CodeQL can now be set via the CODEQL_THREADS and CODEQL_RAM runner environment variables. If set, these environment variables override the threads and ram inputs respectively. #2891

3.28.17 - 02 May 2025

  • Update default CodeQL bundle version to 2.21.2. #2872

3.28.16 - 23 Apr 2025

  • Update default CodeQL bundle version to 2.21.1. #2863

3.28.15 - 07 Apr 2025

  • Fix bug where the action would fail if it tried to produce a debug artifact with more than 65535 files. #2842

3.28.14 - 07 Apr 2025

  • Update default CodeQL bundle version to 2.21.0. #2838

3.28.13 - 24 Mar 2025

No user facing changes.

3.28.12 - 19 Mar 2025

  • Dependency caching should now cache more dependencies for Java build-mode: none extractions. This should speed up workflows and avoid inconsistent alerts in some cases.

... (truncated)

Commits
  • ce28f5b Merge pull request #2926 from github/update-v3.29.0-e8799281c
  • bc251b7 Update changelog for v3.29.0
  • e879928 Merge pull request #2925 from github/update-bundle/codeql-bundle-v2.22.0
  • efd43b3 Merge branch 'main' into update-bundle/codeql-bundle-v2.22.0
  • 7cb9b16 Merge pull request #2912 from github/henrymercer/bump-minimum-codeql-2.16.6
  • 3855117 Add changelog note
  • f5d4e2a Update default bundle to codeql-bundle-v2.22.0
  • 22deae8 Update package-lock.json
  • df2a830 Merge branch 'main' into henrymercer/bump-minimum-codeql-2.16.6
  • b1e4dc3 Merge pull request #2916 from github/dependabot/npm_and_yarn/npm-5cdccdc43f
  • Additional commits viewable in compare view

Updates sigstore/cosign-installer from 3.8.2 to 3.9.0

Release notes

Sourced from sigstore/cosign-installer's releases.

v3.9.0

What's Changed

Full Changelog: sigstore/cosign-installer@v3...v3.9.0

Commits

Updates docker/setup-buildx-action from 3.10.0 to 3.11.0

Release notes

Sourced from docker/setup-buildx-action's releases.

v3.11.0

Full Changelog: docker/setup-buildx-action@v3.10.0...v3.11.0

Commits
  • 18ce135 Merge pull request #425 from docker/dependabot/npm_and_yarn/docker/actions-to...
  • 0e198e9 chore: update generated content
  • 05f3f3a build(deps): bump @​docker/actions-toolkit from 0.61.0 to 0.62.1
  • 6229134 Merge pull request #427 from crazy-max/keep-state
  • c6f6a07 chore: update generated content
  • 6c5e29d skip builder creation if one already exists with the same name
  • 548b297 ci: keep-state check
  • 36590ad check if driver compatible with keep-state
  • 4143b58 Support to retain cache
  • 3f1544e Merge pull request #139 from hashhar/hashhar/cleanup-aliases
  • Additional commits viewable in compare view

Updates anchore/sbom-action from 0.20.0 to 0.20.1

Release notes

Sourced from anchore/sbom-action's releases.

v0.20.1

Changes in v0.20.1

  • Update Syft to v1.27.1 (#525)
Commits

Updates actions/attest-sbom from 2.2.0 to 2.4.0

Release notes

Sourced from actions/attest-sbom's releases.

v2.4.0

What's Changed

Full Changelog: actions/attest-sbom@v2.2.0...v2.4.0

Commits
  • bd218ad bump actions/attest from 2.3.0 to 2.4.0 (#178)
  • bb6e4f0 Bump the npm-development group across 1 directory with 5 updates (#176)
  • 4d6ee98 Bump undici from 5.28.5 to 5.29.0 (#172)
  • 22e8414 Bump the npm-development group with 6 updates (#174)
  • 9d8c9ca Bump super-linter/super-linter in the actions-minor group (#173)
  • 8253d9c Bump the npm-development group with 2 updates (#171)
  • c0e357e Bump actions/attest from 2.2.1 to 2.3.0 in the actions-minor group (#169)
  • bced3cb Bump the npm-development group with 5 updates (#170)
  • 32cff21 offboard from eslint in superlinter (#167)
  • 33f0747 Bump the npm-development group with 6 updates (#163)
  • Additional commits viewable in compare view

Updates actions/attest-build-provenance from 2.3.0 to 2.4.0

Release notes

Sourced from actions/attest-build-provenance's releases.

v2.4.0

What's Changed

Full Changelog: actions/attest-build-provenance@v2.3.0...v2.4.0

Commits
  • e8998f9 bump actions/attest from 2.3.0 to 2.4.0 (#654)
  • 11c67f2 Bump the npm-development group across 1 directory with 6 updates (#649)
  • 39cb715 Bump the npm-development group across 1 directory with 7 updates (#641)
  • 7d91c40 Bump undici from 5.28.5 to 5.29.0 (#633)
  • d848170 Bump super-linter/super-linter in the actions-minor group (#640)
  • 0ca36ea Bump the npm-development group with 7 updates (#582)
  • d82e7cd offboard from eslint in superlinter (#618)
  • See full diff in compare view

Updates anchore/scan-action from 6.2.0 to 6.3.0

Release notes

Sourced from anchore/scan-action's releases.

v6.3.0

New in scan-action v6.3.0

  • Update Grype to v0.94.0 (#470)
Commits
  • be7a22d chore(deps): update Grype to v0.94.0 (#470)
  • 77f24ed chore: remove npm audit from workflow (#475)
  • 251fd2c chore(deps-dev): bump eslint from 9.25.1 to 9.26.0 (#465)
  • 98d9c29 Fix issue with missing permissions directive in example workflow (#466)
  • 52d195a chore(deps): update Grype to v0.92.0 (#464)
  • 16d8e06 chore(deps-dev): bump lint-staged from 15.5.1 to 16.0.0 (#468)
  • See full diff in compare view

Updates dawidd6/action-download-artifact from 10 to 11

Release notes

Sourced from dawidd6/action-download-artifact's releases.

v11

Full Changelog: dawidd6/action-download-artifact@v10...v11

Commits

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions

Bumps the action-deps group with 9 updates in the / directory:

| Package | From | To |
| --- | --- | --- |
| [step-security/harden-runner](https://github.com/step-security/harden-runner) | `2.12.0` | `2.12.1` |
| [github/codeql-action](https://github.com/github/codeql-action) | `3.28.19` | `3.29.0` |
| [sigstore/cosign-installer](https://github.com/sigstore/cosign-installer) | `3.8.2` | `3.9.0` |
| [docker/setup-buildx-action](https://github.com/docker/setup-buildx-action) | `3.10.0` | `3.11.0` |
| [anchore/sbom-action](https://github.com/anchore/sbom-action) | `0.20.0` | `0.20.1` |
| [actions/attest-sbom](https://github.com/actions/attest-sbom) | `2.2.0` | `2.4.0` |
| [actions/attest-build-provenance](https://github.com/actions/attest-build-provenance) | `2.3.0` | `2.4.0` |
| [anchore/scan-action](https://github.com/anchore/scan-action) | `6.2.0` | `6.3.0` |
| [dawidd6/action-download-artifact](https://github.com/dawidd6/action-download-artifact) | `10` | `11` |



Updates `step-security/harden-runner` from 2.12.0 to 2.12.1
- [Release notes](https://github.com/step-security/harden-runner/releases)
- [Commits](step-security/harden-runner@0634a26...002fdce)

Updates `github/codeql-action` from 3.28.19 to 3.29.0
- [Release notes](https://github.com/github/codeql-action/releases)
- [Changelog](https://github.com/github/codeql-action/blob/main/CHANGELOG.md)
- [Commits](github/codeql-action@fca7ace...ce28f5b)

Updates `sigstore/cosign-installer` from 3.8.2 to 3.9.0
- [Release notes](https://github.com/sigstore/cosign-installer/releases)
- [Commits](sigstore/cosign-installer@3454372...fb28c2b)

Updates `docker/setup-buildx-action` from 3.10.0 to 3.11.0
- [Release notes](https://github.com/docker/setup-buildx-action/releases)
- [Commits](docker/setup-buildx-action@b5ca514...18ce135)

Updates `anchore/sbom-action` from 0.20.0 to 0.20.1
- [Release notes](https://github.com/anchore/sbom-action/releases)
- [Changelog](https://github.com/anchore/sbom-action/blob/main/RELEASE.md)
- [Commits](anchore/sbom-action@e11c554...9246b90)

Updates `actions/attest-sbom` from 2.2.0 to 2.4.0
- [Release notes](https://github.com/actions/attest-sbom/releases)
- [Changelog](https://github.com/actions/attest-sbom/blob/main/RELEASE.md)
- [Commits](actions/attest-sbom@115c3be...bd218ad)

Updates `actions/attest-build-provenance` from 2.3.0 to 2.4.0
- [Release notes](https://github.com/actions/attest-build-provenance/releases)
- [Changelog](https://github.com/actions/attest-build-provenance/blob/main/RELEASE.md)
- [Commits](actions/attest-build-provenance@db473fd...e8998f9)

Updates `anchore/scan-action` from 6.2.0 to 6.3.0
- [Release notes](https://github.com/anchore/scan-action/releases)
- [Changelog](https://github.com/anchore/scan-action/blob/main/RELEASE.md)
- [Commits](anchore/scan-action@2c901ab...be7a22d)

Updates `dawidd6/action-download-artifact` from 10 to 11
- [Release notes](https://github.com/dawidd6/action-download-artifact/releases)
- [Commits](dawidd6/action-download-artifact@4c1e823...ac66b43)

---
updated-dependencies:
- dependency-name: step-security/harden-runner
  dependency-version: 2.12.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: action-deps
- dependency-name: github/codeql-action
  dependency-version: 3.29.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: sigstore/cosign-installer
  dependency-version: 3.9.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: docker/setup-buildx-action
  dependency-version: 3.11.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: anchore/sbom-action
  dependency-version: 0.20.1
  dependency-type: direct:production
  update-type: version-update:semver-patch
  dependency-group: action-deps
- dependency-name: actions/attest-sbom
  dependency-version: 2.4.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: actions/attest-build-provenance
  dependency-version: 2.4.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: anchore/scan-action
  dependency-version: 6.3.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
  dependency-group: action-deps
- dependency-name: dawidd6/action-download-artifact
  dependency-version: '11'
  dependency-type: direct:production
  update-type: version-update:semver-major
  dependency-group: action-deps
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Jun 18, 2025
@dependabot dependabot bot requested a review from jkreileder as a code owner June 18, 2025 02:54
@codecov
Copy link

codecov bot commented Jun 18, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 100.00%. Comparing base (20ccde6) to head (f93087a).
Report is 1 commits behind head on main.

✅ All tests successful. No failed tests found.

Additional details and impacted files
@@            Coverage Diff            @@
##              main      #836   +/-   ##
=========================================
  Coverage   100.00%   100.00%           
=========================================
  Files            8         8           
  Lines          151       151           
  Branches        11        11           
=========================================
  Hits           151       151           
Flag Coverage Δ
python-3.10 100.00% <ø> (ø)
python-3.11 100.00% <ø> (ø)
python-3.12 100.00% <ø> (ø)
python-3.13 100.00% <ø> (ø)
python-3.9 100.00% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@github-actions
Copy link

github-actions bot commented Jun 18, 2025

Test Results

  5 files  ±0    5 suites  ±0   5s ⏱️ ±0s
 36 tests ±0   36 ✅ ±0  0 💤 ±0  0 ❌ ±0 
180 runs  ±0  180 ✅ ±0  0 💤 ±0  0 ❌ ±0 

Results for commit f93087a. ± Comparison against base commit 20ccde6.

♻️ This comment has been updated with latest results.

@github-actions
Copy link

🔍 Vulnerabilities of jkreileder/cf-ips-to-hcloud-fw:pr-836

📦 Image Reference jkreileder/cf-ips-to-hcloud-fw:pr-836
digestsha256:f358126b9bf247e9fef23c94d6cd5b694bbba4ca32986f8fa7209efb45d49e06
vulnerabilitiescritical: 2 high: 0 medium: 1 low: 0
platformlinux/amd64
size26 MB
packages59
📦 Base Image python:3-alpine3.21
also known as
  • 3.13-alpine3.21
  • 3.13.4-alpine3.21
  • alpine3.21
digestsha256:7a12a6fcff5e21880667bbf1ff8ac29181b6ad2a455293dd942a408753ba45ba
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
critical: 2 high: 0 medium: 0 low: 0 h11 0.14.0 (pypi)

pkg:pypi/[email protected]

critical 9.1: GHSA--vqfr--h8mv--ghfj OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities

Affected range<0.16.0
Fixed version0.16.0
CVSS Score9.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

A leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions.

critical 9.1: CVE--2025--43859 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Affected range<0.16.0
Fixed version0.16.0
CVSS Score9.1
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score0.052%
EPSS Percentile16th percentile
Description

Impact

A leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions.

Details

HTTP/1.1 Chunked-Encoding bodies are formatted as a sequence of "chunks", each of which consists of:

  • chunk length
  • \r\n
  • length bytes of content
  • \r\n

In versions of h11 up to 0.14.0, h11 instead parsed them as:

  • chunk length
  • \r\n
  • length bytes of content
  • any two bytes

i.e. it did not validate that the trailing \r\n bytes were correct, and if you put 2 bytes of garbage there it would be accepted, instead of correctly rejecting the body as malformed.

By itself this is harmless. However, suppose you have a proxy or reverse-proxy that tries to analyze HTTP requests, and your proxy has a different bug in parsing Chunked-Encoding, acting as if the format is:

  • chunk length
  • \r\n
  • length bytes of content
  • more bytes of content, as many as it takes until you find a \r\n

For example, pound had this bug -- it can happen if an implementer uses a generic "read until end of line" helper to consumes the trailing \r\n.

In this case, h11 and your proxy may both accept the same stream of bytes, but interpret them differently. For example, consider the following HTTP request(s) (assume all line breaks are \r\n):

GET /one HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

5
AAAAAXX2
45
0

GET /two HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

0

Here h11 will interpret it as two requests, one with body AAAAA45 and one with an empty body, while our hypothetical buggy proxy will interpret it as a single request, with body AAAAXX20\r\n\r\nGET /two .... And any time two HTTP processors both accept the same string of bytes but interpret them differently, you have the conditions for a "request smuggling" attack. For example, if /two is a dangerous endpoint and the job of the reverse proxy is to stop requests from getting there, then an attacker could use a bytestream like the above to circumvent this protection.

Even worse, if our buggy reverse proxy receives two requests from different users:

GET /one HTTP/1.1
Host: localhost
Transfer-Encoding: chunked

5
AAAAAXX999
0
GET /two HTTP/1.1
Host: localhost
Cookie: SESSION_KEY=abcdef...

...it will consider the first request to be complete and valid, and send both on to the h11-based web server over the same socket. The server will then see the two concatenated requests, and interpret them as one request to /one whose body includes /two's session key, potentially allowing one user to steal another's credentials.

Patches

Fixed in h11 0.15.0.

Workarounds

Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.

Credits

Reported by Jeppe Bonde Weikop on 2025-01-09.

critical: 0 high: 0 medium: 1 low: 0 requests 2.32.3 (pypi)

pkg:pypi/[email protected]

medium 5.3: CVE--2024--47081 Insufficiently Protected Credentials

Affected range<2.32.4
Fixed version2.32.4
CVSS Score5.3
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
EPSS Score0.062%
EPSS Percentile20th percentile
Description

Impact

Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.

Workarounds

For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs).

References

psf/requests#6965
https://seclists.org/fulldisclosure/2025/Jun/2

@github-actions
Copy link

Recommended fixes for image jkreileder/cf-ips-to-hcloud-fw:pr-836

Base image is python:3-alpine3.21

Name3.13.4-alpine3.21
Digestsha256:7a12a6fcff5e21880667bbf1ff8ac29181b6ad2a455293dd942a408753ba45ba
Vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0
Pushed2 weeks ago
Size17 MB
Packages43
Flavoralpine
OS3.21
Runtime3.13.4
The base image is also available under the supported tag(s): 3.13-alpine3.21, alpine3.21

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.
TagDetailsPushedVulnerabilities
3-alpine3.21
Newer image for same tag
Also known as:
  • alpine3.21
  • 3.13.5-alpine3.21
  • 3.13-alpine3.21
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Newer image for same tag
  • Image contains 5 fewer packages
  • Tag was pushed more recently
  • Image has similar size
  • Image has same number of vulnerabilities
Image details:
  • Size: 17 MB
  • Flavor: alpine
  • OS: 3.21
  • Runtime: 3.13.5
6 days ago



Change base image

TagDetailsPushedVulnerabilities
3-alpine
Tag is preferred tag
Also known as:
  • alpine
  • alpine3.22
  • 3.13.5-alpine
  • 3.13.5-alpine3.22
  • 3.13-alpine
  • 3.13-alpine3.22
  • 3-alpine3.22
Benefits:
  • Same OS detected
  • Minor runtime version update
  • Minor OS version update
  • Image contains 4 fewer packages
  • Tag is preferred tag
  • Tag was pushed more recently
  • Image has similar size
  • Image has same number of vulnerabilities
  • 3-alpine was pulled 51K times last month
Image details:
  • Size: 17 MB
  • Flavor: alpine
  • OS: 3.22
  • Runtime: 3.13.5
6 days ago



@github-actions
Copy link

Overview

Image reference jkreileder/cf-ips-to-hcloud-fw:1 quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836
- digest dd18d18ca96b f358126b9bf2
- tag 1 pr-836
- provenance 5387efd b90b50b
- vulnerabilities critical: 2 high: 2 medium: 3 low: 0 critical: 2 high: 0 medium: 1 low: 0
- platform linux/amd64 linux/amd64
- size 24 MB 26 MB (+1.8 MB)
- packages 62 59 (-3)
Base Image python:3-alpine
also known as:
3.13-alpine
alpine
python:3-alpine3.21
also known as:
3.13-alpine3.21
alpine3.21
- vulnerabilities critical: 0 high: 2 medium: 2 low: 0 critical: 0 high: 0 medium: 0 low: 0
Environment Variables (2 changes)
  • ± 2 changed
  • 4 unchanged
 GPG_KEY=7169605F62C751356D054A26A821E680E5FA6305
 PATH=/usr/local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
 PYTHONDONTWRITEBYTECODE=1
 PYTHONFAULTHANDLER=1
-PYTHON_SHA256=9cf9427bee9e2242e3877dd0f6b641c1853ca461f39d6503ce260a59c80bf0d9
+PYTHON_SHA256=27b15a797562a2971dce3ffe31bb216042ce0b995b39d768cf15f784cc757365
-PYTHON_VERSION=3.13.1
+PYTHON_VERSION=3.13.4
Labels (3 changes)
  • ± 3 changed
  • 5 unchanged
-org.opencontainers.image.created=2024-12-22T13:10:48.667Z
+org.opencontainers.image.created=2025-06-18T21:45:19.967Z
 org.opencontainers.image.description=Update Hetzner Cloud firewall rules with current Cloudflare IP ranges
 org.opencontainers.image.licenses=MIT
-org.opencontainers.image.revision=5387efdaf829ded112cb2acdde1ab4916839a5ee
+org.opencontainers.image.revision=b90b50b1835fa19b190ffe7c2550797aa78acec4
 org.opencontainers.image.source=https://github.com/jkreileder/cf-ips-to-hcloud-fw
 org.opencontainers.image.title=cf-ips-to-hcloud-fw
 org.opencontainers.image.url=https://github.com/jkreileder/cf-ips-to-hcloud-fw
-org.opencontainers.image.version=1.0.15
+org.opencontainers.image.version=pr-836
Policies (0 improved, 2 worsened, 2 missing data)
Policy Name jkreileder/cf-ips-to-hcloud-fw:1 quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836 Change Standing
Default non-root user No Change
No AGPL v3 licenses No Change
No fixable critical or high vulnerabilities ⚠️ 2 +2 Worsened
No high-profile vulnerabilities No Change
No outdated base images ❓ No data
No unapproved base images ❓ No data
Supply chain attestations ⚠️ 2 +2 Worsened
Packages and Vulnerabilities (49 package changes and 4 vulnerability changes)
  • ➕ 2 packages added
  • ➖ 5 packages removed
  • ♾️ 42 packages changed
  • 15 packages unchanged
  • ✔️ 4 vulnerabilities removed
Changes for packages of type apk (33 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836
♾️ .python-rundeps 20241205.142133 20250605.070647
alpine-base 3.21.3-r0
♾️ alpine-baselayout 3.6.5-r0 3.6.8-r1
♾️ alpine-baselayout-data 3.6.5-r0 3.6.8-r1
♾️ alpine-keys 2.4-r1 2.5-r0
alpine-release 3.21.3-r0
♾️ apk-tools 2.14.4-r0 2.14.6-r3
♾️ busybox 1.36.1-r29 1.37.0-r12
♾️ busybox-binsh 1.36.1-r29 1.37.0-r12
♾️ ca-certificates 20240705-r0 20241121-r1
♾️ ca-certificates-bundle 20240705-r0 20241121-r1
♾️ libcrypto3 3.3.2-r1 3.3.3-r0
♾️ libffi 3.4.6-r0 3.4.7-r0
♾️ libncursesw 6.4_p20240420-r2 6.5_p20241006-r3
♾️ libpanelw 6.4_p20240420-r2 6.5_p20241006-r3
♾️ libssl3 3.3.2-r1 3.3.3-r0
♾️ libuuid 2.40.1-r1 2.40.4-r1
♾️ musl 1.2.5-r0 1.2.5-r9
critical: 0 high: 1 medium: 0 low: 0
Removed vulnerabilities (1):
  • high : CVE--2025--26519
♾️ musl-utils 1.2.5-r0 1.2.5-r9
♾️ ncurses 6.4_p20240420-r2 6.5_p20241006-r3
♾️ ncurses-terminfo-base 6.4_p20240420-r2 6.5_p20241006-r3
♾️ openssl 3.3.2-r1 3.3.3-r0
critical: 0 high: 0 medium: 2 low: 0
Removed vulnerabilities (2):
  • medium : CVE--2024--12797
  • medium : CVE--2024--13176
♾️ pax-utils 1.3.7-r2 1.3.8-r1
♾️ readline 8.2.10-r0 8.2.13-r0
♾️ scanelf 1.3.7-r2 1.3.8-r1
♾️ sqlite 3.45.3-r1 3.48.0-r2
♾️ sqlite-libs 3.45.3-r1 3.48.0-r2
♾️ ssl_client 1.36.1-r29 1.37.0-r12
♾️ tzdata 2024b-r0 2025b-r0
♾️ util-linux 2.40.1-r1 2.40.4-r1
♾️ xz 5.6.2-r0 5.6.3-r1
critical: 0 high: 1 medium: 0 low: 0
Removed vulnerabilities (1):
  • high : CVE--2025--31115
♾️ xz-libs 5.6.2-r0 5.6.3-r1
♾️ zlib 1.3.1-r1 1.3.1-r2
Changes for packages of type generic (1 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836
♾️ python 3.13.1 3.13.4
Changes for packages of type nuget (5 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836
Simple Launcher 1.1.0.14
t32.exe 1.1.0.14
t64.exe 1.1.0.14
w32.exe 1.1.0.14
w64.exe 1.1.0.14
Changes for packages of type pypi (10 changes)
Package Version
jkreileder/cf-ips-to-hcloud-fw:1
Version
quay.io/jkreileder/cf-ips-to-hcloud-fw:pr-836
♾️ anyio 4.7.0 4.9.0
♾️ certifi 2024.12.14 2025.1.31
♾️ cf-ips-to-hcloud-fw 1.0.15 1.0.16.dev0
♾️ charset-normalizer 3.4.0 3.4.1
♾️ cloudflare 3.1.1 4.1.0
♾️ hcloud 2.3.0 2.4.0
♾️ httpx 0.27.2 0.28.1
♾️ pip 24.3.1 25.1.1
♾️ pydantic 2.9.2 2.10.6
♾️ pydantic-core 2.23.4 2.27.2

@jkreileder jkreileder merged commit fd0e735 into main Jun 18, 2025
64 checks passed
@jkreileder jkreileder deleted the dependabot/github_actions/action-deps-a3a99b4ebd branch June 18, 2025 21:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants