-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build, vendor: address CVE-2024-45338 #86
build, vendor: address CVE-2024-45338 #86
Conversation
nice thanks |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Worth to make sure we run make vendor on CI (i will check later)
because otherwise we had already cases stuff was forgotten
go.mod
Outdated
@@ -57,13 +58,13 @@ require ( | |||
go.uber.org/multierr v1.11.0 // indirect | |||
go.uber.org/zap v1.26.0 // indirect | |||
golang.org/x/exp v0.0.0-20220722155223-a9213eeb770e // indirect | |||
golang.org/x/net v0.23.0 // indirect | |||
golang.org/x/net v0.33.0 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
there is already 0.34.0 if you want
cdfe916
to
34858a2
Compare
34858a2
to
05e2b47
Compare
Seems there isnt |
/lgtm |
I'd rather rely on dependabot for this kind of stuff ... |
Bump golang.org/x/net to v0.34.0, which is the latest released version. The aforementioned CVE is fixed in v0.33.0. Signed-off-by: Miguel Duarte Barroso <[email protected]>
05e2b47
to
0237c0d
Compare
/lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: maiqueb The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
Bump golang.org/x/net to v0.34.0, which is the latest released version.
The aforementioned CVE is fixed in v0.33.0.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes: https://github.com/kubevirt/ipam-extensions/security/dependabot/3
Fixes: https://github.com/kubevirt/ipam-extensions/security/dependabot/4
Special notes for your reviewer:
Release note: