-
Notifications
You must be signed in to change notification settings - Fork 5.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vulnerabilities in packages Telegraf depends on (Telegraf 1.18.2) #9225
Comments
Thanks for opening the issue! I just checked Telegraf 1.18.2 and we are on github.com/dgrijalva/jwt-go/v4, this is the pr that fixed it from Telegraf 1.16.2 onwards. Also this pr updates apache/thrift to v0.13.0 and updates hashicorp/consul to v1.6.0 which should be included in 1.19.0. There is an existing issue also about upgrading to higher than v1.6.0 for hashicorp. |
Thank you @helenosheaa . if jwt-go was fixed in 1.16.2, why is it flagged for 1.18.2 ? Do you know ? Are you saying this is false positive ? Sorry @ssoroka , i didn't realize the title was in all caps :( |
I'm not sure why it's flagging it, the only place I can see v3.2.0+incompatible is in our go.sum but our go.mod only has the version v4.0.0-preview1 with the fix in it and thats the only one we are importing into our packages. I'll link on here when the pr with the fix for the other ones gets released. |
@vishiy Would you rescan now that 9238 is merged? If you need binaries for the scan you could the PR CI build (#9238 (comment)) or the next nightly. |
@reimda thanks. I tried with the last release (1.18.3). Below are the vulnerabilties i see on the dependencies . |
I think the I am going to go ahead and close this. We do have a security policy for notifying of potential CVEs. Please do use the email and steps in our SECURITY.md document. Thanks! |
Please see the below CVEs with HIGH severity
Expected : No CVEs. Please upgrade to later packages (see FIXED version in the image above for the go packages)
The text was updated successfully, but these errors were encountered: