chore(security): update docker base images and patch go dependencies#5459
Open
nXtCyberNet wants to merge 2 commits intolitmuschaos:masterfrom
Open
chore(security): update docker base images and patch go dependencies#5459nXtCyberNet wants to merge 2 commits intolitmuschaos:masterfrom
nXtCyberNet wants to merge 2 commits intolitmuschaos:masterfrom
Conversation
Signed-off-by: nXtCyberNet <rohantech2005@gmail.com>
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Proposed changes
This PR updates Dockerfiles across the repository to use the latest patched base images (primarily UBI variants) and applies security patches/updates to Go dependencies where applicable.
Closes / Fixes:
Note: This is a focused refresh of the original intent behind #5394, but without any broader dependency alignments (e.g., no gnostic/protobuf replaces or Argo-related changes) to keep the PR minimal and avoid CI blockers from unrelated conflicts.
Types of changes
What types of changes does your code introduce to Litmus? Put an
xin the boxes that applyChecklist
Put an
xin the boxes that apply. You can also fill these out after creating the PR. If you're unsure about any of them, don't hesitate to ask. We're here to help! This is simply a reminder of what we are going to look for before merging your code.Dependency
Special notes for your reviewer:
microdnf module enable nginx:1.20not needed in newer UBI versions; unused python3/pip installs if confirmed removable).github.com/google/gnostic-modelsinstead ofgithub.com/google/gnostic; to ensure security vulnerabilities could be properly addressed, the correct module (gnostic-models) has been added where required. please see Critical Security Risks in Litmus via Outdated Argo Dependencies (incl. CVE-2025-32445 PrivEsc + unmaintained gnostic protobuf library) #5458This PR directly targets the reported CVEs by updating the base images used in the chaoscenter-related Dockerfiles to their latest patched UBI versions. Once merged and images rebuilt, a fresh scan should show significant reduction or closure of the listed vulnerabilities in the chaoscenter images.
Thanks for reviewing — let's get these security updates landed!