Skip to content

Commit

Permalink
Merge pull request #114103 from pacoxu/automated-cherry-pick-of-#1140…
Browse files Browse the repository at this point in the history
…96-upstream-release-1.23

Automated cherry pick of #114096: changelog: CVE-2022-3294 and CVE-2022-3162 were fixed in
  • Loading branch information
k8s-ci-robot committed Nov 24, 2022
2 parents 58d4ada + ec2718f commit e3eac96
Showing 1 changed file with 3 additions and 3 deletions.
6 changes: 3 additions & 3 deletions CHANGELOG/CHANGELOG-1.23.md
Expand Up @@ -240,7 +240,7 @@
- [Urgent Upgrade Notes](#urgent-upgrade-notes)
- [(No, really, you MUST read this before you upgrade)](#no-really-you-must-read-this-before-you-upgrade)
- [Known Issues](#known-issues)
- [Etcd v3.5.[0-2] data corruption](#etcd-v350-2-data-corruption)
- [Etcd v3.5.\[0-2\] data corruption](#etcd-v350-2-data-corruption)
- [Changes by Kind](#changes-by-kind-14)
- [Deprecation](#deprecation)
- [API Change](#api-change-5)
Expand Down Expand Up @@ -462,7 +462,7 @@ A security issue was discovered in Kubernetes where users authorized to list or
**Fixed Versions**:
- kube-apiserver v1.25.4
- kube-apiserver v1.24.8
- kube-apiserver v1.23.13
- kube-apiserver v1.23.14
- kube-apiserver v1.22.16

This vulnerability was reported by Richard Turnbull of NCC Group as part of the Kubernetes Audit
Expand All @@ -488,7 +488,7 @@ The merged fix enforces validation against the proxying address for a Node. In s
**Fixed Versions**:
- kube-apiserver v1.25.4
- kube-apiserver v1.24.8
- kube-apiserver v1.23.13
- kube-apiserver v1.23.14
- kube-apiserver v1.22.16

This vulnerability was reported by Yuval Avrahami of Palo Alto Networks
Expand Down

0 comments on commit e3eac96

Please sign in to comment.