Skip to content

Ignore Docker daemon-side vulns in govulncheck#4521

Merged
ChrisJBurns merged 1 commit intomainfrom
cburns/ignore-docker-daemon-vulns
Apr 3, 2026
Merged

Ignore Docker daemon-side vulns in govulncheck#4521
ChrisJBurns merged 1 commit intomainfrom
cburns/ignore-docker-daemon-vulns

Conversation

@ChrisJBurns
Copy link
Copy Markdown
Collaborator

Summary

  • The govulncheck CI check is failing due to two new Docker daemon-side vulnerabilities (GO-2026-4883, GO-2026-4887) that were published on 2026-04-02. ToolHive only uses the Docker client SDK to manage containers and is not affected by these daemon-internal issues (plugin privilege validation and AuthZ plugin bypass).
  • No fixed version exists for the github.com/docker/docker module path — the patches are only in github.com/moby/moby/v2 v2.0.0-beta.8+ which hasn't been published as a docker/docker release yet. Adding both to the govulncheck ignore list with justification unblocks CI.

Fixes the security scan failure on #4520.

Type of change

  • Bug fix (non-breaking change which fixes an issue)

Test plan

  • CI security scan passes with the updated ignore list

Generated with Claude Code

GO-2026-4883 (plugin privilege validation) and GO-2026-4887 (AuthZ
plugin bypass) affect Docker daemon internals. ToolHive only uses the
Docker client SDK and is not impacted. No fix exists for the
github.com/docker/docker module path yet — the patch is only in
github.com/moby/moby/v2 v2.0.0-beta.8+.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@ChrisJBurns ChrisJBurns requested a review from JAORMX as a code owner April 3, 2026 14:39
@github-actions github-actions bot added the size/XS Extra small PR: < 100 lines changed label Apr 3, 2026
@codecov
Copy link
Copy Markdown

codecov bot commented Apr 3, 2026

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 69.01%. Comparing base (a948281) to head (36f09f7).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #4521      +/-   ##
==========================================
- Coverage   69.02%   69.01%   -0.01%     
==========================================
  Files         502      502              
  Lines       52008    52008              
==========================================
- Hits        35899    35894       -5     
- Misses      13320    13324       +4     
- Partials     2789     2790       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@ChrisJBurns ChrisJBurns merged commit ce3ade5 into main Apr 3, 2026
20 of 21 checks passed
@ChrisJBurns ChrisJBurns deleted the cburns/ignore-docker-daemon-vulns branch April 3, 2026 14:46
rdimitrov added a commit to stacklok/toolhive-registry-server that referenced this pull request Apr 3, 2026
Adopts the same pattern as stacklok/toolhive#4521: output govulncheck
as JSON and filter out known false positives with documented
justifications. This replaces the previous approach of scoping the
scan to the production binary entry point.

Excluded CVEs (Docker daemon vulnerabilities, not reachable via the
client SDK used by testcontainers):
- GO-2026-4883: Moby plugin privilege validation (CVE-2026-33997)
- GO-2026-4887: AuthZ plugin bypass (CVE-2026-34040)

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
MatteoManzoni pushed a commit to DocPlanner/toolhive that referenced this pull request Apr 4, 2026
GO-2026-4883 (plugin privilege validation) and GO-2026-4887 (AuthZ
plugin bypass) affect Docker daemon internals. ToolHive only uses the
Docker client SDK and is not impacted. No fix exists for the
github.com/docker/docker module path yet — the patch is only in
github.com/moby/moby/v2 v2.0.0-beta.8+.

Co-authored-by: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/XS Extra small PR: < 100 lines changed

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants