Skip to content

Fix several go CVEs in release-1.13 [crypto,kubernetes,net]#565

Merged
amacaskill merged 1 commit intoGoogleCloudPlatform:release-1.3from
chrisThePattyEater:release-1.3
Apr 16, 2025
Merged

Fix several go CVEs in release-1.13 [crypto,kubernetes,net]#565
amacaskill merged 1 commit intoGoogleCloudPlatform:release-1.3from
chrisThePattyEater:release-1.3

Conversation

@chrisThePattyEater
Copy link
Copy Markdown
Collaborator

What type of PR is this?

Uncomment only one /kind <> line, hit enter to put that in a new line, and remove leading whitespaces from that line:

/kind api-change
/kind bug
/kind cleanup
/kind design
/kind documentation
/kind failing-test
/kind feature
/kind flake

What this PR does / why we need it:
This PR addresses security vulnerabilities in tag 1.3.5 and supersedes the missing/deleted 1.3.4 version. There was an unexplained deletion that disrupted automated version control flows and impacted component history. To continue cleanly from v1.3.3, this tag includes the following go module upgrades:
Module updates:

  • golang.org/x/crypto: v0.22.0 → v0.35.0
  • k8s.io/kubernetes: v1.29.4 → v1.29.14
  • golang.org/x/net: v0.24.0 → v0.36.0

Which issue(s) this PR fixes:

Does not fix but is in relation to the following bug -
https://b.corp.google.com/issues/407850643
Special notes for your reviewer:

Does this PR introduce a user-facing change?:

This release corrects the following CVE's:
- CVE-2024-45337  
- CVE-2024-5321  
- CVE-2024-10220  
- CVE-2025-22869  
- CVE-2024-9042  
- CVE-2025-22870  
- CVE-2025-0426  

@chrisThePattyEater chrisThePattyEater force-pushed the release-1.3 branch 3 times, most recently from e7968a3 to 81a49cb Compare April 16, 2025 20:52
@amacaskill amacaskill merged commit 08a6523 into GoogleCloudPlatform:release-1.3 Apr 16, 2025
5 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants