-
Notifications
You must be signed in to change notification settings - Fork 220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update Go for security reasons #1440
Comments
@jrm5100 thank you for the report! Figuring out whether the CVEs are exploitable in Miller is a bit of a project; it's much easier to just move to 1.19. Miller itself doesn't ask much of compiler versions: e.g. I have 1.21 on my laptop for all dev work and this works fine. The only reason I haven't been totally cutting-edge about the version in Miller That said: (a) Go 1.21 is out; 1.18 goes back a ways; moving to 1.19 isn't a move to the bleeding edge; (b) a CVE is enough reason to risk the chance of breaking the Miller port on some distro somewhere (until they also move up to Go 1.19). |
#1441 is merged. I'll also soon make a 6.10 release with this in it. |
Thanks again!!! |
I have Miller in a docker image which was run through Docker Scout. It pointed out a few CVEs in the Go stdlib, including two critical ones:
These were fixed in Go
1.19.9
/1.20.4
and1.19.8
/1.20.3
respectively (as were several CVEs rated lower than critical).I'll caveat this by admitting that I haven't looked at much Go code before (or written any) and I am not sure if these specific CVEs or any of the other less urgent ones are at all relevant or potentially exploitable. From what I understand
1.19
is a major version difference from1.18
but with minimal language differences. Is it worth attempting to update the version of Go used by Miller?The text was updated successfully, but these errors were encountered: