-
Notifications
You must be signed in to change notification settings - Fork 443
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade the grpc_health_probe version to v0.4.11 to resolve security vulnerability CVE-2022-27191 #1875
Upgrade the grpc_health_probe version to v0.4.11 to resolve security vulnerability CVE-2022-27191 #1875
Conversation
93975d8
to
f155e96
Compare
/retest |
Hitting docker limits. We have to wait a bit |
/retest |
2 similar comments
/retest |
/retest |
11655dc
to
6fc227a
Compare
/retest |
pull rate limit... |
/retest |
1 similar comment
/retest |
@kubeflow/wg-automl-leads This PR is ready to merge. |
Thanks @tenzen-y /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: johnugeorge, tenzen-y The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
What this PR does / why we need it:
I upgraded the grpc_health_probe version to v0.4.11 to resolve security vulnerability CVE-2022-27191.
Also, I added the primaryPodLabels to tfjob's example.
$ trivy image --severity CRITICAL,HIGH docker.io/kubeflowkatib/katib-db-manager:latest 2022-05-25T23:37:21.684+0900 INFO Detected OS: alpine 2022-05-25T23:37:21.684+0900 INFO Detecting Alpine vulnerabilities... 2022-05-25T23:37:21.685+0900 INFO Number of language-specific files: 2 2022-05-25T23:37:21.685+0900 INFO Detecting gobinary vulnerabilities... docker.io/kubeflowkatib/katib-db-manager:latest (alpine 3.15.4) Total: 0 (HIGH: 0, CRITICAL: 0) app/katib-db-manager (gobinary) Total: 0 (HIGH: 0, CRITICAL: 0) bin/grpc_health_probe (gobinary) Total: 1 (HIGH: 1, CRITICAL: 0) ┌─────────────────────┬────────────────┬──────────┬────────────────────────────────────┬───────────────────────────────────┬───────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Installed Version │ Fixed Version │ Title │ ├─────────────────────┼────────────────┼──────────┼────────────────────────────────────┼───────────────────────────────────┼───────────────────────────────────────────────────┤ │ golang.org/x/crypto │ CVE-2022-27191 │ HIGH │ v0.0.0-20210513164829-c07d793c2f9a │ 0.0.0-20220315160706-3147a52a75dd │ golang: crash in a golang.org/x/crypto/ssh server │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-27191 │ └─────────────────────┴────────────────┴──────────┴────────────────────────────────────┴───────────────────────────────────┴───────────────────────────────────────────────────┘
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #
Checklist: