Skip to content

Updates go to 1.23.6 to resolve vulnerabilities #805

Updates go to 1.23.6 to resolve vulnerabilities

Updates go to 1.23.6 to resolve vulnerabilities #805

Triggered via pull request February 13, 2025 22:57
Status Failure
Total duration 1m 11s
Artifacts

deps.yml

on: pull_request
dependency-review
3s
dependency-review
govulncheck
1m 2s
govulncheck
Fit to window
Zoom out
Zoom in

Annotations

10 errors and 1 warning
govulncheck
providers.awsSDKProvider.KeyManagement calls session.NewSessionWithOptions, which eventually calls nistec.P256Point.ScalarBaseMult
govulncheck
ecr.main calls cobra.Command.Execute, which eventually calls nistec.P256Point.ScalarMult
govulncheck
tagging.Controller.Run calls workqueue.delayingType.ShutDown, which eventually calls nistec.P256Point.SetBytes
govulncheck
providers.Cloud.applyUnSchedulableTaint calls core.nodes.Get, which eventually calls http.Client.Do
govulncheck
providers.awsSDKProvider.KeyManagement calls session.NewSessionWithOptions, which eventually calls x509.CertPool.AppendCertsFromPEM
govulncheck
providers.Cloud.DeleteDisk calls prometheus.MultiError.Error, which eventually calls x509.Certificate.Verify
govulncheck
providers.Cloud.DeleteDisk calls prometheus.MultiError.Error, which eventually calls x509.Certificate.VerifyHostname
govulncheck
ecr.main calls cobra.Command.Execute, which eventually calls x509.CreateCertificate
govulncheck
providers.Cloud.DeleteDisk calls x509.HostnameError.Error
govulncheck
ecr.main calls cobra.Command.Execute, which eventually calls x509.MarshalPKCS1PrivateKey
govulncheck
Both go-version and go-version-file inputs are specified, only go-version will be used