-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update to golang.org/x/net@v0.33 to fix CVE-2024-45337(CRITICAL) a… #7915
base: cluster-autoscaler-release-1.30
Are you sure you want to change the base?
Update to golang.org/x/net@v0.33 to fix CVE-2024-45337(CRITICAL) a… #7915
Conversation
|
Welcome @brecode! |
Hi @brecode. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Hey @brecode thanks for offering a fix for the CVE! I see that you're PRing to a CA release branch, so any change that doesn't involve the CA component should probably not be in here. |
…VE-2024-45338(HIGH) * Updated go.mod to corresponding folders * Updated vendor folder
f41fea4
to
4d4ba6c
Compare
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: brecode The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@voelzmo thanks for the feedback, updated PR with changes related to cluster-autoscaler only |
PR title mentions golang.org/x/oauth2@v0.27, but go.mod contents don't actually change this package version - only other packages. |
Also, CA tends to stay in sync with k/k dependencies. I see oauth2 v0.10.0 is also used there: https://github.com/kubernetes/kubernetes/blob/v1.30.11/go.mod#L79 Would you mind addressing this CVE in upstream Kubernetes repository? The dependency will then be imported to Cluster Autoscaler during next update. |
Wrong copy paste. Title fixed. Command used is on description: The above covers the x/crypto CVE too
I can certainly open a PR on kubernetes repo for v1.30.11. I see cluster autoscaler is using 1.30.5 Is that going to be upgraded to 1.30.xx (latest) on next release for cluster-autoscaler ? Thanks |
Yes, it already was: #7922 For k/k repo, 1.30.11 tag already exists, but CVE fix can be included in time before 1.30.12 comes out (this month I think?) |
Opened a PR here: kubernetes/kubernetes#130832. In the meantime is there any other reason not to merge this or you want this update to be brought in from k8s 1.30.12? |
Autoscaler isn't running an SSH server is it?? I would recommend using a symbol aware scanner. |
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Trivy scans alerted on cluster-autoscaler:v1.30.3 on following CVEs
CVE-2024-45337
CVE-2024-45338
This PR addresses the above CVEs on autoscaler release-1.30 codebase
Does this PR introduce a user-facing change?
NONE