-
Notifications
You must be signed in to change notification settings - Fork 76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please release fix for CVE-2022-28948 #93
Comments
I believe it was determined this was a yaml v3 issue, which currently is not what sigs/yaml is based on (it's still v2). |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
this is an issue only with go-yaml/yaml v3 (go-yaml/yaml#666 (comment)) this repo still uses v2 and is not affected by this issue /close |
@liggitt: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Good morning,
It appears https://pkg.go.dev/sigs.k8s.io/yaml@v1.3.0 does not contain a fix for CVE-2022-28948.
According to go-yaml/yaml#666, a fix has been generated for CVE-2022-28948.
Is it possible then to please release a patch that fixes this CVE within the upcoming weeks?
The text was updated successfully, but these errors were encountered: