Replies: 2 comments 8 replies
-
Firstly, I'm amazed that CVE got a medium. We discussed it internally and saw no possible way of exploiting it. @siretart Has Debian considered backporting the fix for it (or, potentially, already done so)? |
Beta Was this translation helpful? Give feedback.
1 reply
-
But where does this leave me as a downstream consumer of the source repository? I cannot use v4 as I need to talk to a fixed or unfixed v3 podman in service deployment and a v4 client cannot connect to a v3 podman service. |
Beta Was this translation helpful? Give feedback.
7 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
I'm forced to use the podman v3 REST API client because Debian and Ubuntu LTS currently only ship podman v3.4 packages.
Using the v3 client causes a govuln hit, as can be seen here: https://deps.dev/go/github.com%2Fthediveo%2Fsealwatcher/v0.8.0
How to best deal with this? Note that upgrading the client isn't possible because a v4 client gets rejected by a v3 server and my users won't upgrade their LTS distros using debian experimental packages.
Beta Was this translation helpful? Give feedback.
All reactions