Skip to content

Conversation

@DevenGengan
Copy link
Owner

snyk-top-banner

Snyk has created this PR to fix 2 vulnerabilities in the dockerfile dependencies of this project.

Keeping your Docker base image up-to-date means you’ll benefit from security fixes in the latest version of your chosen image.

Snyk changed the following file(s):

  • build/alpine.Dockerfile

We recommend upgrading to golang:1.24.0-alpine, as this image has only 0 known vulnerabilities. To do this, merge this pull request, then verify your application still works as expected.

Vulnerabilities that will be fixed with an upgrade:

Issue Score
low severity CVE-2024-13176
SNYK-ALPINE321-OPENSSL-8690014
  436  
low severity CVE-2024-13176
SNYK-ALPINE321-OPENSSL-8690014
  436  
low severity CVE-2024-12797
SNYK-ALPINE321-OPENSSL-8710358
  436  
low severity CVE-2024-12797
SNYK-ALPINE321-OPENSSL-8710358
  436  

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.
  • This PR was automatically created by Snyk using the credentials of a real user.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open fix PRs.

For more information:
🧐 View latest project report
📜 Customise PR templates
🛠 Adjust project settings
📚 Read about Snyk's upgrade logic


Learn how to fix vulnerabilities with free interactive lessons:

🦉 Learn about vulnerability in an interactive lesson of Snyk Learn.

@dryrunsecurity
Copy link

DryRun Security Summary

The PR updates the Alpine Linux Dockerfile for golangci-lint by upgrading the Golang base image and adding global Git directory configurations, though it introduces potential security concerns around directory isolation and build argument handling.

Expand for full summary

This PR updates the Alpine Linux Dockerfile for golangci-lint, upgrading the Golang base image and adding a global Git directory safe configuration. Security findings include:

  1. Potential security risk in build/alpine.Dockerfile: Global git config --global --add safe.directory '*' reduces security isolation between directories.
  2. Build argument handling could potentially expose sensitive information during image build.
  3. While using CGO_ENABLED=0 reduces attack surface, it may impact library compatibility.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

View PR in the DryRun Dashboard.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants