-
Notifications
You must be signed in to change notification settings - Fork 4.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Address CVEs in go-lang binaries #17358
Comments
All of the above affected deps have now been updated and backported to 1.14.x and 1.15.x Thanks for bringing this to our attention! |
@loshz @david-yu Hi, As I can see, all those CVE addressed and backport to new version. In AWS Inspector still is showing CVE-2022-2837 and showing there is no available fix. If that is expected? if yes, when will address th CVE-2022-2837? coreDNS: DNS Redirection of Top-Level Domains |
Overview of the Issue
When running a security scanner like Trivy against the latest release of Consul (which at the moment is
1.15.2
), multiple CVEs and vulnerabilities are reported.Reproduction Steps
Consul info for both Client and Server
NA
Operating system and Environment details
NA
Log Fragments
NA
The text was updated successfully, but these errors were encountered: