Skip to content

Conversation

@smoshiur1237
Copy link
Contributor

@smoshiur1237 smoshiur1237 commented Dec 4, 2025

Trivy picks up a CVE that would require a go version bump to fix properly.

=== Symbol Results ===
Vulnerability #1: GO-2025-4175
    Improper application of excluded DNS name constraints when verifying
    wildcard names in crypto/x509
  More info: https://pkg.go.dev/vuln/GO-2025-4175
  Standard library
    Found in: crypto/[email protected]
    Fixed in: crypto/[email protected]
    Example traces found:
      #1: cmd/models-schema/main.go:35:21: models.main calls fmt.Fprintf, which eventually calls x509.Certificate.Verify
Vulnerability #2: GO-2025-4155
    Excessive resource consumption when printing error string for host
    certificate validation in crypto/x509
  More info: https://pkg.go.dev/vuln/GO-2025-4155
  Standard library
    Found in: crypto/[email protected]
    Fixed in: crypto/[email protected]
    Example traces found:
      #1: cmd/models-schema/main.go:35:21: models.main calls fmt.Fprintf, which eventually calls x509.Certificate.Verify
      #2: cmd/models-schema/main.go:35:21: models.main calls fmt.Fprintf, which eventually calls x509.Certificate.VerifyHostname

Your code is affected by 2 vulnerabilities from the Go standard library.
This scan found no other vulnerabilities in packages you import or modules you
require.

@k8s-ci-robot k8s-ci-robot added cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Dec 4, 2025
@netlify
Copy link

netlify bot commented Dec 4, 2025

Deploy Preview for kubernetes-sigs-cluster-api-openstack ready!

Name Link
🔨 Latest commit 21151cf
🔍 Latest deploy log https://app.netlify.com/projects/kubernetes-sigs-cluster-api-openstack/deploys/69319aa3ee9cb900083926fb
😎 Deploy Preview https://deploy-preview-2881--kubernetes-sigs-cluster-api-openstack.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@smoshiur1237 smoshiur1237 changed the title 🌱 Bump g01.24.11 🌱 Bump go version to 1.24.11 Dec 4, 2025
Copy link
Contributor

@lentzi90 lentzi90 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 4, 2025
@smoshiur1237
Copy link
Contributor Author

/restest

Signed-off-by: smoshiur1237 <[email protected]>
@smoshiur1237 smoshiur1237 changed the title 🌱 Bump go version to 1.24.11 🌱 Ignore irrelevant CVE Dec 4, 2025
@lentzi90
Copy link
Contributor

lentzi90 commented Dec 5, 2025

/approve cancel
Please don't change PRs so much. It is better to open a new when completely changing what a PR does.

Where do you see that govulncheck says we are not affected? In the description I don't see it. In previous cases we saw this:

Your code is affected by 0 vulnerabilities.
This scan also found 1 vulnerability in packages you import and 2
vulnerabilities in modules you require, but your code doesn't appear to call
these vulnerabilities.

We may still have to ignore these if they require a newer go version, but we should not claim we are unaffected unless that is true.

@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign emilienm for approval. For more information see the Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot removed the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 5, 2025
Copy link
Contributor

@tuminoid tuminoid left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You ARE affected by the stdlib issues, if you use certificates, like govulncheck says.

@smoshiur1237
Copy link
Contributor Author

/retest

@k8s-ci-robot
Copy link
Contributor

@smoshiur1237: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
pull-cluster-api-provider-openstack-test 21151cf link true /test pull-cluster-api-provider-openstack-test

Full PR test history. Your PR dashboard. Please help us cut down on flakes by linking to an open issue when you hit one in your PR.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

Status: Inbox

Development

Successfully merging this pull request may close these issues.

4 participants