Skip to main content
Minimus publishes security advisories for vulnerabilities affecting Minimus images and their dependencies. The information complements the vulnerability report provided for every image version. Select Advisories from the left menu to visit the list of advisories published for Minimus images (or use the direct link).
Advisories List
Affected images only refer to production images. Development image variants (for example, an image tagged latest-dev) are excluded by default.Refer to version-specific vulnerability reports for information about vulnerabilities affecting development images. Learn more

Overview

Before you dive into the details, examine the metrics in the top section:
  • Total number of new vulnerabilities detected in the past 7 days in Minimus packages
  • Total number of vulnerabilities detected over the past year in Minimus packages that are currently known as active exploits (i.e. they are on the CISA KEV list)
  • Total number of vulnerabilities detected over the past year in Minimus images that are currently labeled as likely exploits (i.e. they have a high EPSS probability score and are likely targets for exploitation).
  • Total number of critical severity vulnerabilities detected over the past year in Minimus images.

Advisories table

The advisories table lists all affected packages . Some vulnerabilities affect multiple packages, so you will notice the same vulnerability listed on a separate line for each impacted package. When the affected package is mapped to a Minimus image, the image information and fixed version will appear as well. The advisories table shows the following:
  • CVE ID or GitHub security advisory ID
  • Origin package affected by the vulnerability. Note that affected secondary packages are detailed in the vulnerability report for specific image versions.
  • Affected images (Filtered by default by production images. Excludes dev images, for example latest-dev.)
  • Severity as determined by NVD (CVSS score, where the most recent CVSS vector is shown). Learn more
  • Exploitability Learn more
  • Status
  • Date published
  • First detection
  • Last updated

Filtering, searching, and sorting advisories

  1. Filtering options To help you identify the relevant information quickly, you can filter the advisories list by affected images, severity, exploitability, and status. The filters are friendly UI elements, and do not require complex syntax.
  2. Search options You can search the advisories by a full or partial vulnerability ID and/or a package and image name. You can of course combine search terms with filtering criteria.
  3. Sorting options You may sort the advisories by their severity and last update.

Drill down on an advisory

Click on an advisory in the table to view its detailed listing. When drilling down from the advisories table, a filter is applied by default for the specific origin package.
Filtered By Package
Expand the card to view the full advisory details with detailed information listing all affected images, the current status, fixed package and image version information (if available), and the status history. Learn more
Advisory Details Expanded View

Advisory status

StatusDescription
Under reviewMinimus is following up on the vulnerability report to confirm the report and determine if the vulnerable code affects the package.
AffectedThe vulnerability was confirmed by the Minimus team to be affecting the package.
UnaffectedThe vulnerability was determined to be a false-positive by Minimus. Reasoning is provided in a note.
Pending upstream fixMinimus is waiting for the source repo to publish a fix for the package. The image will be patched as soon as the fix becomes available.
FixedA patch was applied to remediate the vulnerability.
Fix not plannedUsually a fix is not planned for package versions that have reached their end of life (EOL). Reasoning is provided in a note.
Last modified on February 25, 2026