scheduler-plugins
scheduler-plugins copied to clipboard
Uplifted packages to address CVEs
What type of PR is this?
/kind bug
What this PR does / why we need it:
Provides a fix for vulnerabilities (CVEs) which enhances the security of the platform.
Which issue(s) this PR fixes:
Fixes https://github.com/advisories/GHSA-jfvp-7x6p-h2pv Fixes https://github.com/advisories/GHSA-vfvj-3m3g-m532 Fixes https://github.com/advisories/GHSA-mc76-5925-c5p6 Fixes https://github.com/advisories/GHSA-vvgc-356p-c3xw Fixes https://github.com/advisories/GHSA-hcg3-q754-cr77
Special notes for your reviewer:
Does this PR introduce a user-facing change?
Uplifted go packages to versions that provide fixes to the following CVEs in the
| CVE ID | Type | Target | Package |
| ------- | ------ | ------- | ------- |
| CVE-2024-45310 | gobinary | usr/bin/kube-scheduler | github.com/opencontainers/runc |
| CVE-2023-27483 | gobinary | usr/bin/kube-scheduler | github.com/crossplane/crossplane-runtime |
| CVE-2024-9341 | gobinary | usr/bin/kube-scheduler | github.com/containers/common |
| CVE-2025-22872 | gobinary | usr/bin/kube-scheduler | golang.org/x/net |
| CVE-2025-22869 | gobinary | usr/bin/kube-scheduler | golang.org/x/crypto |
Deploy Preview for kubernetes-sigs-scheduler-plugins canceled.
| Name | Link |
|---|---|
| Latest commit | 133f51236eae722829556dc22b284db11446e9d5 |
| Latest deploy log | https://app.netlify.com/projects/kubernetes-sigs-scheduler-plugins/deploys/68373dc69de8620008498d1b |
Hi @silivanmunguar. Thanks for your PR.
I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.
Once the patch is verified, the new status will be reflected by the ok-to-test label.
I understand the commands that are listed here.
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
@seanmalloy @Tal-or @PiotrProkop could I get one of you to okay this for testing and hopefully get it merged?
/ok-to-test
@Huang-Wei thanks for test okay. I would appreciate a review; I am hoping to address a critical CVE in an upcoming release.
Hi @Huang-Wei, just checking in on this PR. Please let us know if there is anything we can do to help move the review forward. Thanks.
Hi @seanmalloy @PiotrProkop @swatisehgal @Tal-or. This PR states that we need a "lgtm" or "approved" label in order to merge. Please let us know if there is anything we can do to help move the review forward. Thanks!
/lgtm
@Travisivart: changing LGTM is restricted to collaborators
In response to this:
/lgtm
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.
/lgtm
I feel that this is a valid change.
/assign @ffromani @Huang-Wei
[APPROVALNOTIFIER] This PR is APPROVED
This pull-request has been approved by: Huang-Wei, silivanmunguar, Travisivart
The full list of commands accepted by this bot can be found here.
The pull request process is described here
- ~~OWNERS~~ [Huang-Wei]
Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment