-
Notifications
You must be signed in to change notification settings - Fork 251
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[mce-2.4] HIVE-2787: CVE-2025-22868 x/oauth2/jws => 0.26.openshift.1 #2603
[mce-2.4] HIVE-2787: CVE-2025-22868 x/oauth2/jws => 0.26.openshift.1 #2603
Conversation
Replace x/oauth2 with the openshift fork containing the fix. (The upstream fix in 0.27.0 requires golang 1.23, and bumping in this release would be Hard™.) https://security.snyk.io/vuln/SNYK-GOLANG-GOLANGORGXOAUTH2JWS-8749594 ACM-18179 (cherry picked from commit 270568c)
@2uasimojo: This pull request references HIVE-2787 which is a valid jira issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## mce-2.4 #2603 +/- ##
========================================
Coverage 57.64% 57.64%
========================================
Files 186 186
Lines 25839 25839
========================================
Hits 14894 14894
Misses 9699 9699
Partials 1246 1246 🚀 New features to boost your workflow:
|
/override ci/prow/security Crypto being addressed via HIVE-2786. The other requires a k8s bump, which isn't happening in this branch. |
/assign @suhanime |
@2uasimojo: Overrode contexts on behalf of 2uasimojo: ci/prow/security In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: 2uasimojo, suhanime The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/override ci/prow/security |
@2uasimojo: Overrode contexts on behalf of 2uasimojo: ci/prow/security In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Not sure what's happening with prow here. I'm gonna mash the merge button. No sense retesting -- nothing else has happened in this branch. |
@2uasimojo: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Replace x/oauth2 with the openshift fork containing the fix. (The upstream fix in 0.27.0 requires golang 1.23, and bumping in this release would be Hard™.)
https://security.snyk.io/vuln/SNYK-GOLANG-GOLANGORGXOAUTH2JWS-8749594
ACM-18179
(cherry picked from commit 270568c)