Replies: 2 comments 24 replies
-
Thanks for the ping @candrews. We should definitely bump the Go version, and try to automate doing this in the future |
Beta Was this translation helpful? Give feedback.
13 replies
-
Would it be helpful for me to submit PRs to the various projects doing this work? I'm eager to get this done as it's causing a lot of headache and paperwork for my Powers That Be. |
Beta Was this translation helpful? Give feedback.
11 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I noticed that many Paketo Buildpacks projects are still using go 1.20 which is EOL / unsupported according to https://go.dev/doc/devel/release
I discovered this issue because security scanners are now reporting vulnerabilities against Paketo Buildpacks and the images they build. For example, CVE-2023-45288 is reported frequently and being a high severity vulnerability it sets off some loud alarms. I'm confident that this vulnerability and the others reported are not exploitable, but their presence is still troublesome for it still requires effort to suppress the findings and justify the reasoning.
Can all usages of go 1.20 please be upgraded to at least go 1.21, ideally 1.22?
I see that Paketo used to have an automatic process for doing go upgrades, as I see many PRs like paketo-buildpacks/native-image#251 by @paketo-bot. Perhaps that automation can be revived?
Beta Was this translation helpful? Give feedback.
All reactions