-
Notifications
You must be signed in to change notification settings - Fork 332
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add fix for CVE-2022-28948 #2532
Add fix for CVE-2022-28948 #2532
Conversation
Hi @qu1queee. Thanks for your PR. I'm waiting for a knative member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
2ac4c7f
to
a3595e1
Compare
Per go-yaml/yaml#666, the recommendation is to bump to v3.0.1. I detected this as an indirect dependency that was flagged in net-istio.
a3595e1
to
81f533d
Compare
Codecov Report
@@ Coverage Diff @@
## main #2532 +/- ##
=======================================
Coverage 81.63% 81.63%
=======================================
Files 163 163
Lines 9744 9744
=======================================
Hits 7955 7955
Misses 1551 1551
Partials 238 238 Continue to review full report at Codecov.
|
/ok-to-test |
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Patch update is pretty straightforward.
/lgtm
/assign @dprotaso @evankanderson
(so as to not abuse release lead superpowers)
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: dprotaso, qu1queee The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Changes
/kind cleanup
Fixes
Due to CVE 2022-28948. External users of packages such as knative/net-istio might get flagged by vulnerability scanning tools.
Release Note