Fix CVE in release-0.24#2157
Conversation
|
🤖 Created branch: z_pr2157/dfarrell07/fix-0.24-cves-2026-05-06 |
|
Warning Rate limit exceeded
To continue reviewing without waiting, purchase usage credits in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (2)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Full package: github.com/coredns/coredns Fixes: GHSA-2wpx-qpw2-g5h5, GHSA-63cw-r7xf-jmwr, GHSA-h8mm-c463-wjq3, GHSA-qhmp-q7xh-99rh, GHSA-vp29-5652-4fw9 Signed-off-by: Daniel Farrell <dfarrell@redhat.com>
7a4113c to
69cc9a1
Compare
4a1d082 to
68df046
Compare
Indirect dep pulled in by coredns v1.14.3 upgrade. MPL-2.0 approved by CNCF GB exception (2019-03-11) for golang-lru v1; v2 is the same project/repo/license. Signed-off-by: Daniel Farrell <dfarrell@redhat.com>
68df046 to
f8f4bf6
Compare
See commit message for details.