fix: [CI-17792]: Updating dockerfiles and dependencies to fix vulnerabilities. #256
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🔒 Summary of Improvements
✅ Go Runtime Security
🧱 Dependency Updates
golang.org/x/net→ v0.38.0google.golang.org/grpc→ v1.59.0google.golang.org/protobuf→ v1.33.0containerd→ v1.6.38🐳 Container Security Enhancements
zlib→ 1.3.1+openssl→ 3.x / 1.1.1x+busybox→ 1.35+🔍 Security Scan Results
Original Security Scan:
View Report
Updated Security Scan (Post-Fix):
View Report
✅ Resolved Vulnerabilities
🧠 Go Runtime Vulnerabilities
Critical: [GO-2024-2887 (CVE-2024-24790)]
net/netipstandard libraryMedium: CVE-2023-45288
Medium: CVE-2023-44487 ("HTTP/2 Rapid Reset")
Medium: CVE-2024-40635
Medium: CVE-2024-45336
Unassigned: CVE-2025-22871
net/http/internalpackageUnassigned: CVE-2025-22866
crypto/internal/nistecUnassigned: CVE-2024-45341
crypto/x509📦 Dependency Vulnerabilities
High: CVE-2023-39325
golang.org/x/netv0.36.0+High: GHSA-m425-mq94-257g
google.golang.org/grpcv1.56.3+Medium: CVE-2024-24786
google.golang.org/protobufv1.31.0+Medium: CVE-2024-40635
containerdv1.6.38+Medium: CVE-2025-22872
golang.org/x/netv0.38.0🐳 Container Base Image Vulnerabilities
Critical: CVE-2023-45853
zlib1.3.1+Critical: CVE-2022-48174
busybox1.35+ash.cCritical: CVE-2022-37434
zlib1.2.12-r2+Critical: CVE-2022-2068
openssl3.0.4, 1.1.1p, 1.0.2zf+High: CVE-2023-4807
openssl3.1.3, 3.0.11, 1.1.1w+High: CVE-2023-0464
openssl3.1.1, 3.0.9, 1.1.1u+High: CVE-2023-0215
openssl3.0.8, 1.1.1t, 1.0.2zg+BIO_new_NDEFfunctionHigh: CVE-2022-4450
openssl3.0.8, 1.1.1t+PEM_read_bio_ex()functionHigh: CVE-2023-0286
openssl3.0.8, 1.1.1t, 1.0.2zg+Multiple Medium/Low vulnerabilities
openssl,zlib,busybox🧾 Compliance Issues
USERdirective