Go Cryptography vulnerabilities detected by Docker Scan #512
Open
Description
Reopening #496
Hi guys. Not sure if the binaries are actually being updated with the latest builds. This CVE is still showing for me.
Steps to reproduce it:
- Add Dockerfile
FROM alpine:3.17.2
# install codeclimate reporter
RUN wget --quiet https://codeclimate.com/downloads/test-reporter/test-reporter-latest-linux-amd64 -O /usr/local/bin/cc-test-reporter \
&& chmod +x /usr/local/bin/cc-test-reporter
- Run a Docker scan
docker build -t cc-reporter-cve-test . && docker scout cves cc-reporter-cve-test
It comes back with the crypto
CVEs that were supposably patched:
However, when I built the binary from my machine and copied it over to the Docker image it reported no CVEs. So I wonder if the binaries are being updated on CodeClimate's website.
Metadata
Assignees
Labels
No labels