-
Notifications
You must be signed in to change notification settings - Fork 773
update golang 1.12.6 to 1.12.10 #989
Comments
Do we have a link of this CVE's impact? @yeya24 The following description seems to be not clear.
|
See issue golang/go#34540 |
That is great. We can update the golang runtime version to 1.12.10. Could you help to submit a PR? @yeya24 |
Related to: dragonflyoss/dragonfly#989 Signed-off-by: fengzixu <[email protected]>
Related to: dragonflyoss/dragonfly#989 Signed-off-by: fengzixu <[email protected]>
fixed by dragonflyoss/dragonfly#1005 |
I believe that we also need to update pouch linter as well. @allencloud see dragonflyoss/linter#20 |
I have release a new version 0.2.4 of pouchlinter, see https://github.com/pouchcontainer/pouchlinter/blob/v0.2.4/Dockerfile#L23. Please check. If it is OK, I think we could close this, right> |
Related to: dragonflyoss/dragonfly#989 Signed-off-by: fengzixu <[email protected]>
Related to: dragonflyoss/dragonfly#989 Signed-off-by: fengzixu <[email protected]>
Signed-off-by: Gaius <[email protected]>
Ⅰ. Issue Description
There is a CVE for Go and this vulnerability is fixed in 1.12.10. We should update it.
See: https://nvd.nist.gov/vuln/detail/CVE-2019-16276
Some work need to do for updating go
The text was updated successfully, but these errors were encountered: