You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Impact This issue is only relevant to clusters provisioned using RKE1 with
secrets encryption configuration enabled.
A vulnerability has been identified in which an RKE1 cluster keeps constantly
reconciling when secrets encryption configuration is enabled (please see the RKE
documentation).
When reconciling, the Kube API secret values are written in plaintext on the
AppliedSpec. Cluster owners, Cluster members, and Project members (for projects
within the cluster), all have RBAC permissions to view the cluster object from
t...
Advisory GHSA-q6c7-56cq-g2wm references a vulnerability in the following Go modules:
Description:
Impact This issue is only relevant to clusters provisioned using RKE1 with
secrets encryption configuration enabled.
A vulnerability has been identified in which an RKE1 cluster keeps constantly
reconciling when secrets encryption configuration is enabled (please see the
RKE
documentation).
When reconciling, the Kube API secret values are written in plaintext on the
AppliedSpec. Cluster owners, Cluster members, and Project members (for projects
within the cluster), all have RBAC permissions to view the cluster object from
t...
References:
Cross references:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: