-
Notifications
You must be signed in to change notification settings - Fork 412
Upgrade CNI plugins from v1.5.1 to v1.6.2 #6796
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
After did a verification locally, it turns out that the latest cni plugin 1.6.0 still have the CVE, we need to wait the next CNI release to fix it. convert to a draft version first. |
v1.6.2 is out now |
cb0ee11
to
8e1f29c
Compare
Signed-off-by: Lan Luo <luola@vmware.com>
8e1f29c
to
9e57486
Compare
Hi @antoninbas I have verified a local image with these new cni plugins, the CVE is gone now. Can you take a look? |
@luolanzone Yes, backporting this sounds fine to me |
/test-all |
Signed-off-by: Lan Luo <luola@vmware.com>
Signed-off-by: Lan Luo <luola@vmware.com>
For cve-2024-34156