fix: update snyk-docker-plugin to v8.15.1 #6405
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Pull Request Submission Checklist
What does this PR do?
Updates
snyk-docker-pluginto v8.15.1 to fix false positive vulnerabilities reported for RHEL 10 container images.Problem
Users scanning RHEL 10 images receive false positive vulnerability reports where the installed package version already contains the fix. Example:
The installed version (
1.6.1-8.el10) and the fixed version (0:1.6.1-8.el10) are semantically identical—the0:prefix is just the default epoch.Root Cause
For RHEL 10, the vulnerability matching logic uses the source package information from the
upstreamPURL qualifier. The plugin was constructing this qualifier with only the version number (e.g.,pam@1.6.1), omitting the release component (-8.el10). This caused version comparisons to fail because1.6.1is evaluated as older than1.6.1-8.el10.Solution
The snyk-docker-plugin v8.15.1 fix includes the full version with release component in the
upstreamqualifier (e.g.,pam@1.6.1-8.el10), enabling accurate version matching.Where should the reviewer start?
package.json— single dependency version updateHow should this be manually tested?
What's the product update that needs to be communicated to CLI users?
Container Scanning: Fixed false positive vulnerabilities for Red Hat Enterprise Linux 10 images where packages were incorrectly reported as vulnerable despite already being patched.
Risk Assessment
Low
Any background context you want to provide?
What are the relevant tickets?