scheduler-plugins icon indicating copy to clipboard operation
scheduler-plugins copied to clipboard

Uplifted packages to address CVEs

Open silivanmunguar opened this issue 6 months ago • 7 comments

What type of PR is this?

/kind bug

What this PR does / why we need it:

Provides a fix for vulnerabilities (CVEs) which enhances the security of the platform.

Which issue(s) this PR fixes:

Fixes https://github.com/advisories/GHSA-jfvp-7x6p-h2pv Fixes https://github.com/advisories/GHSA-vfvj-3m3g-m532 Fixes https://github.com/advisories/GHSA-mc76-5925-c5p6 Fixes https://github.com/advisories/GHSA-vvgc-356p-c3xw Fixes https://github.com/advisories/GHSA-hcg3-q754-cr77

Special notes for your reviewer:

Does this PR introduce a user-facing change?

 Uplifted go packages to versions that provide fixes to the following CVEs in the 
| CVE ID |  Type | Target | Package |	                    
| ------- | ------ | ------- | ------- |
| CVE-2024-45310 |	gobinary |  usr/bin/kube-scheduler    | github.com/opencontainers/runc	            |
| CVE-2023-27483 | gobinary |  usr/bin/kube-scheduler    | github.com/crossplane/crossplane-runtime |
| CVE-2024-9341   | gobinary | usr/bin/kube-scheduler	    | github.com/containers/common	            |
| CVE-2025-22872 |	gobinary |  usr/bin/kube-scheduler    | golang.org/x/net	                                    |
| CVE-2025-22869 | gobinary |  usr/bin/kube-scheduler    | golang.org/x/crypto	                                    |

silivanmunguar avatar May 28 '25 16:05 silivanmunguar

Deploy Preview for kubernetes-sigs-scheduler-plugins canceled.

Name Link
Latest commit 133f51236eae722829556dc22b284db11446e9d5
Latest deploy log https://app.netlify.com/projects/kubernetes-sigs-scheduler-plugins/deploys/68373dc69de8620008498d1b

netlify[bot] avatar May 28 '25 16:05 netlify[bot]

Hi @silivanmunguar. Thanks for your PR.

I'm waiting for a kubernetes-sigs member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

k8s-ci-robot avatar May 28 '25 16:05 k8s-ci-robot

@seanmalloy @Tal-or @PiotrProkop could I get one of you to okay this for testing and hopefully get it merged?

silivanmunguar avatar Jun 05 '25 17:06 silivanmunguar

/ok-to-test

Huang-Wei avatar Jun 16 '25 23:06 Huang-Wei

@Huang-Wei thanks for test okay. I would appreciate a review; I am hoping to address a critical CVE in an upcoming release.

silivanmunguar avatar Jun 17 '25 15:06 silivanmunguar

Hi @Huang-Wei, just checking in on this PR. Please let us know if there is anything we can do to help move the review forward. Thanks.

nicole-romeroo avatar Jun 27 '25 16:06 nicole-romeroo

Hi @seanmalloy @PiotrProkop @swatisehgal @Tal-or. This PR states that we need a "lgtm" or "approved" label in order to merge. Please let us know if there is anything we can do to help move the review forward. Thanks!

nicole-romeroo avatar Jul 01 '25 19:07 nicole-romeroo

/lgtm

Travisivart avatar Jul 22 '25 14:07 Travisivart

@Travisivart: changing LGTM is restricted to collaborators

In response to this:

/lgtm

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

k8s-ci-robot avatar Jul 22 '25 14:07 k8s-ci-robot

/lgtm

I feel that this is a valid change.

/assign @ffromani @Huang-Wei

kannon92 avatar Jul 29 '25 17:07 kannon92

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Huang-Wei, silivanmunguar, Travisivart

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment Approvers can cancel approval by writing /approve cancel in a comment

k8s-ci-robot avatar Jul 31 '25 16:07 k8s-ci-robot