Merge pull request #114096 from pacoxu/vul-version-wrong

changelog: CVE-2022-3294 and CVE-2022-3162 were fixed in v1.23.14
This commit is contained in:
Kubernetes Prow Robot 2022-11-24 00:30:04 -08:00 committed by GitHub
commit 8f2371bcce
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
4 changed files with 10 additions and 10 deletions

View File

@ -268,7 +268,7 @@
- [CPU and Memory manager are not working correctly for Guaranteed Pods with multiple containers](#cpu-and-memory-manager-are-not-working-correctly-for-guaranteed-pods-with-multiple-containers) - [CPU and Memory manager are not working correctly for Guaranteed Pods with multiple containers](#cpu-and-memory-manager-are-not-working-correctly-for-guaranteed-pods-with-multiple-containers)
- [`CSIMigrationvSphere` feature gate has not migrated to new CRD APIs](#csimigrationvsphere-feature-gate-has-not-migrated-to-new-crd-apis) - [`CSIMigrationvSphere` feature gate has not migrated to new CRD APIs](#csimigrationvsphere-feature-gate-has-not-migrated-to-new-crd-apis)
- [Workloads that saturate nodes with pods may see pods that fail due to node admission](#workloads-that-saturate-nodes-with-pods-may-see-pods-that-fail-due-to-node-admission) - [Workloads that saturate nodes with pods may see pods that fail due to node admission](#workloads-that-saturate-nodes-with-pods-may-see-pods-that-fail-due-to-node-admission)
- [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption) - [Etcd v3.5.\[0-2\] data corruption](#etcd-v350-2-data-corruption)
- [Urgent Upgrade Notes](#urgent-upgrade-notes) - [Urgent Upgrade Notes](#urgent-upgrade-notes)
- [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade)
- [Changes by Kind](#changes-by-kind-15) - [Changes by Kind](#changes-by-kind-15)
@ -498,7 +498,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -524,7 +524,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -240,7 +240,7 @@
- [Urgent Upgrade Notes](#urgent-upgrade-notes) - [Urgent Upgrade Notes](#urgent-upgrade-notes)
- [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade)
- [Known Issues](#known-issues) - [Known Issues](#known-issues)
- [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption) - [Etcd v3.5.\[0-2\] data corruption](#etcd-v350-2-data-corruption)
- [Changes by Kind](#changes-by-kind-14) - [Changes by Kind](#changes-by-kind-14)
- [Deprecation](#deprecation) - [Deprecation](#deprecation)
- [API Change](#api-change-5) - [API Change](#api-change-5)
@ -462,7 +462,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -488,7 +488,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -379,7 +379,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -405,7 +405,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -303,7 +303,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -329,7 +329,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks