-
Notifications
You must be signed in to change notification settings - Fork 769
Require a new Release to resolve vulnerabilities #1034
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Please also update to a golang version without CVE https://nvd.nist.gov/vuln/detail/CVE-2024-24790 or golang/go#67680 |
I would also very much appreciate a bugfix update :-) |
Can someone please take look on this issue and provide the updates. |
Hi, any news here? Would be really great to have patch release with vulnerability fixes. |
Hi there! Any news? |
Bumping, we need this too please and don't want to build it our own. |
any news about this issue ? |
#1088 will prepare a new release. Looks like the libraries have been updated in go.mod beyond what was originally reported here so I believe the new release will include the fixes. |
v0.16.0 has been released |
@sysadmind what about the other PRs that have been waiting for months? |
Hi Team, below are the CVE's vulnerable for postgres_exporter image.
Vulnerable library - golang.org/x/crypto with a version v0.14.0
Vulnerable library - google.golang.org/protobuf with a version v1.31.0
Vulnerable library - golang.org/x/net with a version v0.17.0
We can see upgraded versions for these libraries in master branch, so we require a release.
The last version was released on 6 November 2023. Since then there are no updates.
Can someone please take a look at it.
Please consider a JIRA from our end - https://jira.cloudera.com/browse/DSE-36793
The text was updated successfully, but these errors were encountered: