-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Critical Golang vulnerability in v0.13.2 #362
Comments
Related to #324 |
@armon @catsby @ryanuber @hc-github-team-es-release-engineering I'm really sorry for the ping but this is important. Can we get a new release so the vulnerabilities don't keep piling up? |
Sorry to ping you directly @NicoletaPopoviciu Can we get a new release so the vulnerabilities don't keep piling up? |
Sorry to ping you directly @dhiaayachi Can we get a new release so the vulnerabilities don't keep piling up? |
I hate to respond with "+1", but I'm also in need of a release. a container I'm using I believe these would all be resolved by republishing anything after go updated |
According to the CODEOWNERS file in this repository, the Consul team are the owners of envconsul. Since the issues in this repository seem unmonitored, I've created an issue in the Consul repository to get the vulnerabilities addressed. |
Also CVE-2023-45288 |
Hi all, thanks for reporting the issue and really sorry about the delay on this. For future reporting of vulnerabilities, we recommend reaching to the |
Envconsul version
Which is the latest release available
https://github.com/hashicorp/envconsul/releases
Contains critical golang vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2024-24790
golang/go#67680
The text was updated successfully, but these errors were encountered: