Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade CNI plugins from v1.4.0 to v1.5.1 #6475

Merged
merged 1 commit into from
Jun 25, 2024

Conversation

antoninbas
Copy link
Contributor

@antoninbas antoninbas commented Jun 21, 2024

For CVE-2024-24790

The vulnerability is currently flagged by scanners with CRITICAL severity. After review, I do not think this vulnerability can really be exploited in the context of the antrea-agent.

For [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790)

The vulnerability is currently flagged by scanners with CRTICIAL
severity. After review, I do not think this vulnerability can really be
exploited in the context of the antrea-agent.

Signed-off-by: Antonin Bas <antonin.bas@broadcom.com>
@antoninbas
Copy link
Contributor Author

Even though it should not affect Antrea, we should still backport this.

@antoninbas antoninbas added the action/backport Indicates a PR that requires backports. label Jun 21, 2024
@antoninbas
Copy link
Contributor Author

Currently blocked by containernetworking/plugins#1059

@antoninbas
Copy link
Contributor Author

/test-all
/test-windows-all

@antoninbas
Copy link
Contributor Author

Currently blocked by containernetworking/plugins#1059

That issue has been resolved, this PR is now ready for review / merge.

Copy link
Member

@tnqn tnqn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@antoninbas antoninbas merged commit 6076c59 into antrea-io:main Jun 25, 2024
55 of 58 checks passed
@antoninbas antoninbas deleted the upgrade-cni-plugins-to-v1.5.1 branch June 25, 2024 18:43
antoninbas added a commit to antoninbas/antrea that referenced this pull request Jun 25, 2024
For [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790)

The vulnerability is currently flagged by scanners with CRTICIAL
severity. After review, I do not think this vulnerability can really be
exploited in the context of the antrea-agent.

Signed-off-by: Antonin Bas <antonin.bas@broadcom.com>
antoninbas added a commit to antoninbas/antrea that referenced this pull request Jun 26, 2024
For [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790)

The vulnerability is currently flagged by scanners with CRTICIAL
severity. After review, I do not think this vulnerability can really be
exploited in the context of the antrea-agent.

Signed-off-by: Antonin Bas <antonin.bas@broadcom.com>
antoninbas added a commit that referenced this pull request Jun 26, 2024
For [CVE-2024-24790](https://nvd.nist.gov/vuln/detail/CVE-2024-24790)

The vulnerability is currently flagged by scanners with CRTICIAL
severity. After review, I do not think this vulnerability can really be
exploited in the context of the antrea-agent.

Signed-off-by: Antonin Bas <antonin.bas@broadcom.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
action/backport Indicates a PR that requires backports.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants