Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(sec) CVE High Vulnerability #8277

Merged
merged 5 commits into from
Sep 14, 2022
Merged

fix(sec) CVE High Vulnerability #8277

merged 5 commits into from
Sep 14, 2022

Conversation

skrdgraph
Copy link
Contributor

@skrdgraph skrdgraph commented Sep 14, 2022

Problem

As we are nearing cherry-pick process, there have been some CVE reports on our core repo. These CVEs are not critical (luckily). The assumption we had was that these CVEs are at linux layer as opposed to our go pkg layer. This assumption led to an attempt to fix it up by upgrading docker linux layer in this PR #8238 by @darkn3rd (which will not fix our errors & this PR should be closed) . There were 2 issues here:

Solution

I am addressing HIGH & some MEDIUMs/LOWs.

In this I am fixing the following vulnerabilities:

fyi @matthewmcneely @darkn3rd

@skrdgraph skrdgraph mentioned this pull request Sep 14, 2022
@skrdgraph skrdgraph changed the title fix(test) CVE Vulnerability fix(test) CVE High Vulnerability Sep 14, 2022
@skrdgraph skrdgraph marked this pull request as ready for review September 14, 2022 03:36
@skrdgraph
Copy link
Contributor Author

There were quite a few merge conflicts ... so had to reopen another branch for this #8265

Copy link
Contributor

@sanjayk-github-dev sanjayk-github-dev left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good.

@skrdgraph skrdgraph merged commit 0d0545b into main Sep 14, 2022
@skrdgraph skrdgraph deleted the skrdgraph/sec_cve_high branch September 14, 2022 04:08
@skrdgraph skrdgraph added the CVE Issues Related to CVE label Sep 14, 2022
dshekhar95 pushed a commit that referenced this pull request Sep 19, 2022
@skrdgraph skrdgraph changed the title fix(test) CVE High Vulnerability fix(sec) CVE High Vulnerability Oct 3, 2022
joshua-goldstein added a commit that referenced this pull request Dec 14, 2022
## Problem

Currently our CI runs against main. We would like to run CI against our
slash branch also.

## Solution

In order for CI to run on release/v21.03-slash we must bring over all
the latest changes we made to our main branch. This is work going back a
few months, hence the large number of changes. Going forward we should
keep CI/CD related changes on release branches and main in harmony.

## Steps:
```
git checkout release/v21.03-slash
git checkout main -- Makefile
git checkout main -- dgraph/Makefile
git checkout main -- .github
git checkout main -- .go-version
git checkout main -- t
git checkout main -- tlstest/mtls_internal/tls
git checkout main -- graphql/e2e/custom_logic/cmd/Dockerfile
git checkout main -- systest/ldbc
git rm .github/workflows/{main.yml,golanglintci-lint.yml,label.yml}
```

Bring in coverage changes from #8494 in testutil/{docker.go,bulk.go},
bring in updated dockercompose files (with coverage variable), and
coverage entrypoint

## Todo

#8277
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
CVE Issues Related to CVE
Development

Successfully merging this pull request may close these issues.

2 participants