Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability - CVE-2023-44487 #2110

Open
ChristianZaccaria opened this issue May 10, 2024 · 3 comments
Open

Vulnerability - CVE-2023-44487 #2110

ChristianZaccaria opened this issue May 10, 2024 · 3 comments

Comments

@ChristianZaccaria
Copy link

A new CVE has been found:
image

Introduced through: github.com/kubeflow/training-operator@0.0.0 › sigs.k8s.io/scheduler-plugins@v0.28.9 › k8s.io/kubernetes@v1.28.8

For some context:
https://www.cve.org/CVERecord?id=CVE-2023-44487
kubernetes/kubernetes#121197

Potential solution
Based on the Kubernetes issue mentioned above, several repositories have opted towards disabling HTTP2. Is this something we could/should do as well?

@tenzen-y
Copy link
Member

@ChristianZaccaria Thank you for reporting this. Feel free to open PR.

@ChristianZaccaria
Copy link
Author

@tenzen-y I am wondering if we are okay with disabling HTTP2 to resolve this? Thank you!

@tenzen-y
Copy link
Member

@tenzen-y I am wondering if we are okay with disabling HTTP2 to resolve this? Thank you!

Oh, I assumed bumping kube libraries version is enough. But, we need to do something more.
So, could we decide on the approach after golang/go#63518 is concluded?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants