-
Notifications
You must be signed in to change notification settings - Fork 25
chore(deps): bump golang.org/x/crypto from 0.31.0 to 0.35.0 to fix CVE-2025-22869 #55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): bump golang.org/x/crypto from 0.31.0 to 0.35.0 to fix CVE-2025-22869 #55
Conversation
Signed-off-by: Kanika Rana <[email protected]>
Signed-off-by: Kanika Rana <[email protected]>
@ranakan19: The label(s) In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hi @ranakan19. Thanks for your PR. I'm waiting for a redhat-developer member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Signed-off-by: Kanika Rana <[email protected]>
/ok-to-test |
…n golangci-lint Signed-off-by: Kanika Rana <[email protected]>
/retest |
/ok-to-test |
/lgtm |
/test v4.13-e2e |
/ok-to-test |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: chetan-rns The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/ok-to-test |
/ok-to-test |
14be804
into
redhat-developer:master
What type of PR is this?
/kind bug
What does this PR do / why we need it:
fixes CVE-2025-22869, note that the new version of golang/x/crypto needs golang to be upgraded to 1.23
Changes:
Have you updated the necessary documentation?
N/A
Which issue(s) this PR fixes:
N/A