-
Notifications
You must be signed in to change notification settings - Fork 120
🌱 Bump Crypto to v0.43.0 and Go to 1.24 to fix vulnerability #2938
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
9c65c71 to
876ea6e
Compare
|
/test metal3-centos-e2e-integration-test-release-1-10 |
c27ca4d to
5162cd0
Compare
|
/test metal3-centos-e2e-integration-test-release-1-10 |
Signed-off-by: Sunnatillo <[email protected]>
Signed-off-by: Sunnatillo <[email protected]>
5162cd0 to
3a6d4c9
Compare
|
/test metal3-centos-e2e-integration-test-release-1-10 |
lentzi90
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a minor go version bump. Can we really do it on a release branch?
I think we usually avoid that.
Bump Crypto to v0.43.0 is a vulnerability fix. And it specifically requires v1.24.9 version. I was hesitant at first. |
Also the go.mod's go version bump is quite big for a patch release so we might need some discussion about it with the whole release team and maintainers. |
Let's wait until monday, My assesment is that although in my eyes fixing the CVE would justify the go.mod GO version bump, the CVE description tells me that we are not affected even do this is a 7,5 CVE as we are not using the effected lib to facilitate SSH connections. So at least IMO we don't need to hurry this let's wait with the patch release until Monday let's the actual security expert take a look. |
Rozzii
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/hold
Let's hold to evaluate the vuln.
|
@adilGhaffarDev noticed CVE is only affecting our e2e test code not he actual application so |
tuminoid
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not really vulnerable, thus we don't bump the go.mod versioning to avoid breaking downstream users.
/close
| module github.com/metal3-io/cluster-api-provider-metal3/api | ||
|
|
||
| go 1.23.7 | ||
| go 1.24.9 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We shouldn't do this in release branches
|
@tuminoid: Closed this PR. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What this PR does / why we need it:
Uplifts Crypto to v0.43.0 and Go to 1.24 to fix vulnerability
Fixes #
Checklist: