-
Notifications
You must be signed in to change notification settings - Fork 68
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Updates to fix grpc and docker CVEs #2878
Conversation
Update generated by `go get -u github.com/docker/docker`/`go mod tidy`. This is flagged by the Vulnerability Scanning GHA on the release-0.15 branch for docker v23.0.5 and was fixed in v24.0.7. Signed-off-by: Daniel Farrell <dfarrell@redhat.com>
Update generated by `google.golang.org/grpc`/`go mod tidy`. This is flagged by the Vulnerability Scanning GHA on the release-0.15 branch for grpc v1.53.0 and was fixed in v1.56.3. Signed-off-by: Daniel Farrell <dfarrell@redhat.com>
🤖 Created branch: z_pr2878/dfarrell07/http_cve2 |
There still an issue with
Same thing if I do |
The otel dependencies are a pain to deal with (not through otel’s fault, and there’s been recent work in |
GHSA-rcjv-mgp8-qvmr identifies go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp as the vulnerable dependency. Bumping that to v0.44.0 requires bumping go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc too, along with all their dependencies. It’s not clear that CVE-2023-45142 actually affects Submariner but this will appease the scanners. Signed-off-by: Stephen Kitt <skitt@redhat.com>
The way to fix this is to look for the first “integration point” in the dependency tree for a given family of dependencies. In
that’s the transition from
|
Oh I see you already added the final commit, thanks! |
🤖 Closed branches: [z_pr2878/dfarrell07/http_cve2] |
See commit messages for details.