Revert "chore(deps): update security updates (major)"#134
Conversation
This reverts commit b3c774a.
📝 WalkthroughWalkthroughThe pull request downgrades multiple direct and indirect dependencies to older major versions in Changes
Estimated code review effort🎯 2 (Simple) | ⏱️ ~12 minutes Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. ✨ Finishing Touches🧪 Generate unit tests (beta)
📝 Coding Plan
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Actionable comments posted: 1
🤖 Prompt for all review comments with AI agents
Verify each finding against the current code and only fix it if needed.
Inline comments:
In `@go.mod`:
- Line 73: Update the module requirement for github.com/docker/cli from
v27.3.1+incompatible to v29.2.0 (or later) in go.mod and then re-resolve the
module graph (e.g., run go get github.com/docker/cli@v29.2.0 and go mod tidy) so
the dependency is upgraded and the lockfiles are refreshed; verify the upgrade
(go list -m all or go mod verify) to ensure the CVE-fixed version is used.
| github.com/davecgh/go-spew v1.1.2-0.20180830191138-d8f796af33cc // indirect | ||
| github.com/decred/dcrd/dcrec/secp256k1/v4 v4.4.0 // indirect | ||
| github.com/docker/cli v29.3.0+incompatible // indirect | ||
| github.com/docker/cli v27.3.1+incompatible // indirect |
There was a problem hiding this comment.
🧩 Analysis chain
🏁 Script executed:
#!/bin/bash
set -euo pipefail
# Verify vulnerability status of the currently pinned version
curl -s https://api.osv.dev/v1/query -H 'Content-Type: application/json' -d '{
"package": { "name": "github.com/docker/cli", "ecosystem": "Go" },
"version": "27.3.1+incompatible"
}'
# Optional: verify a candidate upgraded version (replace X.Y.Z)
# curl -s https://api.osv.dev/v1/query -H 'Content-Type: application/json' -d '{
# "package": { "name": "github.com/docker/cli", "ecosystem": "Go" },
# "version": "X.Y.Z"
# }'Repository: formancehq/auth
Length of output: 4231
Upgrade github.com/docker/cli to v29.2.0 or later before merge.
Version 27.3.1+incompatible is affected by GHSA-p436-gjf2-799p (CVE-2025-15558), a local privilege escalation vulnerability in the Docker CLI plugin manager on Windows. Upgrade to v29.2.0 or later and re-resolve the module graph.
🧰 Tools
🪛 OSV Scanner (2.3.3)
[HIGH] 73-73: github.com/docker/cli 27.3.1+incompatible: Docker CLI Plugins: Uncontrolled Search Path Element Leads to Local Privilege Escalation on Windows
🤖 Prompt for AI Agents
Verify each finding against the current code and only fix it if needed.
In `@go.mod` at line 73, Update the module requirement for github.com/docker/cli
from v27.3.1+incompatible to v29.2.0 (or later) in go.mod and then re-resolve
the module graph (e.g., run go get github.com/docker/cli@v29.2.0 and go mod
tidy) so the dependency is upgraded and the lockfiles are refreshed; verify the
upgrade (go list -m all or go mod verify) to ensure the CVE-fixed version is
used.
Reverts #132
Summary by CodeRabbit