-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCPBUGS-46536: Bump openvswitch #647
base: release-4.14
Are you sure you want to change the base?
Conversation
- Bump openvswitch from 2.13 to 2.17 to mitigate CVE-2019-25076 Signed-off-by: Vinu K <[email protected]>
@k37y: This pull request references Jira Issue OCPBUGS-46536, which is invalid:
Comment The bug has been updated to refer to the pull request using the external bug tracker. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
@k37y: The following test failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
/test e2e-aws-sdn-upgrade |
/jira refresh |
@k37y: This pull request references Jira Issue OCPBUGS-46536, which is invalid:
Comment In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository. |
/assign @danwinship |
Just to be clear: this is not actually about mitigating the CVE; the CVE was mitigated years ago by updating the openvswitch RPM in the RHCOS image (and it would only have been exploitable under ovn-kubernetes anyway). This change is just about preventing the sdn image from being flagged by automated CVE checkers. |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: danwinship, k37y The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
To fix the For the release note, pick "Rebase" for the type, and for the release note text, just note that we updated the image from ovs 2.13 to 2.17 for maintenance reasons but we do not expect any behavioral changes as a result. For the "dependent bug", you can use OCPBUGS-28580, which is the bug that changed the OVS RPM version in 4.15. (So on 46536, scroll to "Issue Links", click the "+" icon on the right, then choose "depends on" and enter OCPBUGS-28580.) |
2.13
to2.17
to mitigate CVE-2019-25076