Replies: 2 comments 8 replies
-
Firstly, I'm amazed that CVE got a medium. We discussed it internally and saw no possible way of exploiting it. @siretart Has Debian considered backporting the fix for it (or, potentially, already done so)? |
Beta Was this translation helpful? Give feedback.
1 reply
-
But where does this leave me as a downstream consumer of the source repository? I cannot use v4 as I need to talk to a fixed or unfixed v3 podman in service deployment and a v4 client cannot connect to a v3 podman service. |
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
I'm forced to use the podman v3 REST API client because Debian and Ubuntu LTS currently only ship podman v3.4 packages.
Using the v3 client causes a govuln hit, as can be seen here: https://deps.dev/go/github.com%2Fthediveo%2Fsealwatcher/v0.8.0
How to best deal with this? Note that upgrading the client isn't possible because a v4 client gets rejected by a v3 server and my users won't upgrade their LTS distros using debian experimental packages.
Beta Was this translation helpful? Give feedback.
All reactions