deps: address CVEs and add security scans to CI#741
Merged
Fricounet merged 2 commits intocontainerd:mainfrom Apr 17, 2026
Merged
deps: address CVEs and add security scans to CI#741Fricounet merged 2 commits intocontainerd:mainfrom
Fricounet merged 2 commits intocontainerd:mainfrom
Conversation
Bump Go to 1.25.9 and refresh modules (gRPC, containerd, AWS SDK, golang.org/x/*, go-jose, selinux, docker/cli, OpenTelemetry, CDI). Update optimizer-server Cargo.lock (rustix). Add a CI job that runs govulncheck and OSV-Scanner on each push and PR. Signed-off-by: Fabiano Fidêncio <ffidencio@nvidia.com>
1bd7577 to
3f15015
Compare
Contributor
Author
|
cc @imeoer |
Contributor
Author
|
cc @bergwolf |
Use S3 transfermanager instead of deprecated feature/s3/manager. Replace deprecated golang.org/x/net/context with the standard library. Signed-off-by: Fabiano Fidêncio <ffidencio@nvidia.com>
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #741 +/- ##
==========================================
+ Coverage 22.02% 24.45% +2.42%
==========================================
Files 130 132 +2
Lines 11931 12237 +306
==========================================
+ Hits 2628 2992 +364
+ Misses 8960 8881 -79
- Partials 343 364 +21
🚀 New features to boost your workflow:
|
Contributor
Author
|
cc @Fricounet |
Fricounet
approved these changes
Apr 17, 2026
Contributor
Fricounet
left a comment
There was a problem hiding this comment.
Nice, LGTM thanks for the PR!
Contributor
Author
|
Ideally we'd like to have a release cut after this one gets merged, so we can ship this on Kata Containers and reduce the amount of vulns there that are not related to Kata itself :-) |
Contributor
|
I've published v0.15.15 which should have the fix |
Contributor
Author
Amazing, I'm already updating it on the Kata Containers side. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Bump Go to 1.25.9 and refresh modules (gRPC, containerd, AWS SDK, golang.org/x/*, go-jose, selinux, docker/cli, OpenTelemetry, CDI). Update optimizer-server Cargo.lock (rustix).
Add a CI job that runs govulncheck and OSV-Scanner on each push and PR.