-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kube-state-metrics v2.10.1 CVE's #2313
Comments
/triage accepted |
I think there's already work in progress for PRISMA-2022-0227 at #2253 |
Thank you, what about these two CVE-2023-45285 and CVE-2023-45283? |
I see the PR is closed #2254, is it not the hook to patch the package? Are we safe to ignore with this comment from here #2254 (comment). I see with the version 3.11.0 prism is silent. |
I can contribute here for the updates, can we get some action plan? |
I suggest the discussion on PRISMA-2022-0227 be kept at #2253 I don't think kube-state-metrics is affected by CVE-2023-48795 because it doesn't make use of crypto/ssh, but I could be mistaken I believe we can update Go regardless of whether or not the remaining ones are false positives Disclaimer: I'm not a maintainer for kube-state-metrics |
v2.11.0 has been released. I assume these have been mitigated. If not, please feel free to reopen and share the ones you believe kube-state-metrics is really affected. |
What happened:
Ran a twistlock scan on kube state metrics version v2.10.1 and found following vulnerabilities
What you expected to happen:
For this for get resolved with the updates. Atleast for high severity.
How to reproduce it (as minimally and precisely as possible):
Scanning the image through twistlock
Anything else we need to know?:
Let me know if this is not right way to submit
Environment:
kubectl version
): 1.21The text was updated successfully, but these errors were encountered: