changelog: CVE-2022-3294 and CVE-2022-3162 were fixed in v1.23.14

This commit is contained in:
Paco Xu 2022-11-24 13:03:44 +08:00
parent 45279654db
commit efb3f79328
4 changed files with 10 additions and 10 deletions

View File

@ -268,7 +268,7 @@
- [CPU and Memory manager are not working correctly for Guaranteed Pods with multiple containers](#cpu-and-memory-manager-are-not-working-correctly-for-guaranteed-pods-with-multiple-containers) - [CPU and Memory manager are not working correctly for Guaranteed Pods with multiple containers](#cpu-and-memory-manager-are-not-working-correctly-for-guaranteed-pods-with-multiple-containers)
- [`CSIMigrationvSphere` feature gate has not migrated to new CRD APIs](#csimigrationvsphere-feature-gate-has-not-migrated-to-new-crd-apis) - [`CSIMigrationvSphere` feature gate has not migrated to new CRD APIs](#csimigrationvsphere-feature-gate-has-not-migrated-to-new-crd-apis)
- [Workloads that saturate nodes with pods may see pods that fail due to node admission](#workloads-that-saturate-nodes-with-pods-may-see-pods-that-fail-due-to-node-admission) - [Workloads that saturate nodes with pods may see pods that fail due to node admission](#workloads-that-saturate-nodes-with-pods-may-see-pods-that-fail-due-to-node-admission)
- [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption) - [Etcd v3.5.\[0-2\] data corruption](#etcd-v350-2-data-corruption)
- [Urgent Upgrade Notes](#urgent-upgrade-notes) - [Urgent Upgrade Notes](#urgent-upgrade-notes)
- [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade)
- [Changes by Kind](#changes-by-kind-15) - [Changes by Kind](#changes-by-kind-15)
@ -498,7 +498,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -524,7 +524,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -240,7 +240,7 @@
- [Urgent Upgrade Notes](#urgent-upgrade-notes) - [Urgent Upgrade Notes](#urgent-upgrade-notes)
- [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade) - [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade)
- [Known Issues](#known-issues) - [Known Issues](#known-issues)
- [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption) - [Etcd v3.5.\[0-2\] data corruption](#etcd-v350-2-data-corruption)
- [Changes by Kind](#changes-by-kind-14) - [Changes by Kind](#changes-by-kind-14)
- [Deprecation](#deprecation) - [Deprecation](#deprecation)
- [API Change](#api-change-5) - [API Change](#api-change-5)
@ -462,7 +462,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -488,7 +488,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -379,7 +379,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -405,7 +405,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks

View File

@ -303,7 +303,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
@ -329,7 +329,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**: **Fixed Versions**:
- kube-apiserver v1.25.4 - kube-apiserver v1.25.4
- kube-apiserver v1.24.8 - kube-apiserver v1.24.8
- kube-apiserver v1.23.13 - kube-apiserver v1.23.14
- kube-apiserver v1.22.16 - kube-apiserver v1.22.16
This vulnerability was reported by Yuval Avrahami of Palo Alto Networks This vulnerability was reported by Yuval Avrahami of Palo Alto Networks