TECHOPS-427: bump LPM_VERSION 0.3.3 → 0.3.4 to clear 5 Go stdlib HIGH CVEs#548
TECHOPS-427: bump LPM_VERSION 0.3.3 → 0.3.4 to clear 5 Go stdlib HIGH CVEs#548sayaliM0412 wants to merge 1 commit into
Conversation
QA vulnerability scans on the docker images (e.g. liquibase/docker run 25763704364) flagged 5 HIGH-severity Go stdlib CVEs in the lpm binary: CVE-2026-33811 (cgo DNS LookupCNAME) CVE-2026-33814 (HTTP/2 SETTINGS frames) CVE-2026-39820 (mail ParseAddress / ParseAddressList) CVE-2026-39836 (Dial / LookupPort NUL byte panic) CVE-2026-42499 (consumePhrase DoS) All five are fixed in Go 1.25.10 / 1.26.3. lpm v0.3.3 was built with Go 1.25.9 and is vulnerable; liquibase-package-manager#619 bumped the toolchain to 1.25.10 on main, and v0.3.4 (released 2026-05-12 21:59Z) is the first tag that picks it up. Bumps LPM_VERSION 0.3.3 → 0.3.4 and the corresponding SHA256/SHA256_ARM checksums in all three Dockerfiles. Checksums sourced from the official checksums.txt asset on the v0.3.4 release. References: - liquibase-package-manager#619 (Go 1.25.10 bump) - liquibase-package-manager v0.3.4: https://github.com/liquibase/liquibase-package-manager/releases/tag/v0.3.4
|
Warning Rate limit exceeded
You’ve run out of usage credits. Purchase more in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (3)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
Claude finished @sayaliM0412's task in 20s —— View job Code Review✅ Changes verified and approved
The PR is ready to merge once CI/QA validation confirms the CVE scans pass. |
… CVEs (#7712) fix: bump LPM_VERSION 0.3.3 → 0.3.4 to clear 5 Go stdlib HIGH CVEs Same bump as the parallel liquibase/docker#548 and liquibase-pro#3794. The community Dockerfiles in this repo (introduced by #7669/DAT-22523 on 2026-04-28 when the docker assets were migrated from liquibase/docker) still pin lpm 0.3.3, which was built with Go 1.25.9 and is vulnerable to 5 HIGH-severity Go stdlib CVEs: CVE-2026-33811 (cgo DNS LookupCNAME) CVE-2026-33814 (HTTP/2 SETTINGS frames) CVE-2026-39820 (mail ParseAddress / ParseAddressList) CVE-2026-39836 (Dial / LookupPort NUL byte panic) CVE-2026-42499 (consumePhrase DoS) All five are fixed in Go 1.25.10 / 1.26.3. liquibase-package-manager#619 bumped the toolchain on main, and v0.3.4 (released 2026-05-12 21:59Z) is the first tag carrying the fix. Bumps LPM_VERSION 0.3.3 → 0.3.4 plus the SHA256/SHA256_ARM checksums in docker/Dockerfile and docker/Dockerfile.alpine. Checksums sourced from the official checksums.txt asset on the v0.3.4 release. References: - liquibase-package-manager#619 (Go 1.25.10 bump) - liquibase-package-manager v0.3.4: https://github.com/liquibase/liquibase-package-manager/releases/tag/v0.3.4 - Parallel docker-repo PR: liquibase/docker#548 - Parallel pro PR: liquibase/liquibase-pro#3794
Summary
Bumps
LPM_VERSIONfrom0.3.3to0.3.4(and the corresponding SHA256/SHA256_ARM checksums) in all three Dockerfiles to pick up the Go 1.25.10 stdlib patches.QA vulnerability scans on the docker images (most recent: liquibase/docker run 25763704364) flagged 5 HIGH-severity Go stdlib CVEs in the bundled lpm binary. All are fixed in Go 1.25.10 / 1.26.3:
liquibase-package-manager#619 bumped the toolchain to Go 1.25.10 on main, and v0.3.4 (released 2026-05-12 21:59Z) is the first tag that picks it up. v0.3.3 was built with Go 1.25.9 and is the version currently baked into all three of our images.
Checksum provenance
Pulled directly from the v0.3.4
checksums.txtasset:Test plan
build-qa-docker.ymlwithbuildTargets="All (Community + Alpine + Secure)"after merge and confirm the three vulnerability-scan jobs no longer flag CVE-2026-33811/33814/39820/39836/42499.lpm --versionreports0.3.4from a built image.Notes
The CVE-2022-0839 finding on
org.liquibase:liquibase-core(the other scan failure) is a separate false-positive on SNAPSHOT version labels and is tracked separately — not addressed here.