-
Notifications
You must be signed in to change notification settings - Fork 521
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New patch release with CVE fixes #2388
Comments
Do these actually have material impact? I'm genuinely curious, does using the software without these patches pose safety concerns for you? Or is there some other external requirement? |
Some scanners like Trivy don't use modern govulncheck, and as such, can have 'false alarms' ea say something is a CVE that isn't actually being called. But the 2 patches that have been merged, represent actually possible vulnerabilities. Once I get a patch version, of d2, than I need to work with yuzutech/kroki to update d2 fyi, if you were creating library only, third party users of your package, should be able to update patch releases, locally ... Thanks for creating/maintaining software for community! |
also, like I was showing in #2381, Thanks |
Would it be possible to get a patch release with the CVE fixes?
#2383 and
#2381
thanks
The text was updated successfully, but these errors were encountered: