-
Notifications
You must be signed in to change notification settings - Fork 33
Fix for Http2 reset vulnerability CVE-2023-39325 #642
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
dd91dc6
to
6852e80
Compare
We should bump the operand versions that have the fix |
The docker image is using |
There is a lot of 1.20 in use:
Anyway there is a fix for 1.21 too. golang/go#63427 |
6852e80
to
e45248e
Compare
e45248e
to
547b8de
Compare
1e1ed07
to
b46cc40
Compare
bundle/community/manifests/tempo-operator-manager-config_v1_configmap.yaml
Outdated
Show resolved
Hide resolved
Signed-off-by: Benedikt Bongartz <[email protected]>
b46cc40
to
4cd0992
Compare
@frzifus any reason why tempo with the fix was not bumped? |
It was done here: #645 |
Does it has the CVE fix? |
https://github.com/grafana/tempo/commits/release-v2.2/ 2.2.3 does not have the fix |
uff - let me bump it |
We can keep our current go version since there is a backport: golang/go#63426