Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updates to fix CVEs #846

Merged
merged 1 commit into from
Nov 14, 2023
Merged

Conversation

dfarrell07
Copy link
Member

Update generated by go get -u google.golang.org/grpc/go mod tidy.

This also bumps golang.org/x/net as a side effect, fixing other CVEs.

GHSA-2wrh-6pvc-2jm9: Impacts net v0.8.0, fixed in v0.13.0.
GHSA-4374-p667-p6c8: Impacts net v0.8.0, fixed in v0.17.0.
GHSA-m425-mq94-257g: Impacts grpc v1.50.1, fixed in v1.56.3.
GHSA-qppj-fm5r-hxr3: Impacts net v0.8.0, fixed in v0.17.0.
GHSA-qppj-fm5r-hxr3: Impacts grpc v1.50.1, fixed in v1.56.3.

Update generated by `go get -u google.golang.org/grpc`/`go mod tidy`.

This also bumps golang.org/x/net as a side effect, fixing other CVEs.

GHSA-2wrh-6pvc-2jm9: Impacts net v0.8.0, fixed in v0.13.0.
GHSA-4374-p667-p6c8: Impacts net v0.8.0, fixed in v0.17.0.
GHSA-m425-mq94-257g: Impacts grpc v1.50.1, fixed in v1.56.3.
GHSA-qppj-fm5r-hxr3: Impacts net v0.8.0, fixed in v0.17.0.
GHSA-qppj-fm5r-hxr3: Impacts grpc v1.50.1, fixed in v1.56.3.

Signed-off-by: Daniel Farrell <[email protected]>
@submariner-bot
Copy link
Contributor

🤖 Created branch: z_pr846/dfarrell07/http_cve14

@tpantelis tpantelis enabled auto-merge (rebase) November 14, 2023 05:18
@tpantelis tpantelis merged commit a600a29 into submariner-io:release-0.14 Nov 14, 2023
12 of 14 checks passed
@submariner-bot
Copy link
Contributor

🤖 Closed branches: [z_pr846/dfarrell07/http_cve14]

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
No open projects
Status: Done
Development

Successfully merging this pull request may close these issues.

4 participants