Skip to content

fix(deps): update module k8s.io/kubernetes to v1.32.10 [security]#51

Open
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-k8s.io-kubernetes-vulnerability
Open

fix(deps): update module k8s.io/kubernetes to v1.32.10 [security]#51
renovate[bot] wants to merge 1 commit intomainfrom
renovate/go-k8s.io-kubernetes-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate bot commented Oct 6, 2025

This PR contains the following updates:

Package Change Age Confidence
k8s.io/kubernetes v1.32.0v1.32.10 age confidence

GitHub Vulnerability Alerts

CVE-2025-0426

A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.

CVE-2024-9042

A security vulnerability has been discovered in Kubernetes windows nodes that could allow a user with the ability to query a node's '/logs' endpoint to execute arbitrary commands on the host. This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.

CVE-2025-4563

A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation.

CVE-2025-5187

A vulnerability exists in the NodeRestriction admission controller in Kubernetes clusters where node users can delete their corresponding node object by patching themselves with an OwnerReference to a cluster-scoped resource. If the OwnerReference resource does not exist or is subsequently deleted, the given node object will be deleted via garbage collection.

CVE-2025-13281

A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).


Release Notes

kubernetes/kubernetes (k8s.io/kubernetes)

v1.32.10: Kubernetes v1.32.10

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.9: Kubernetes v1.32.9

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.8: Kubernetes v1.32.8

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.7: Kubernetes v1.32.7

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.6: Kubernetes v1.32.6

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.5: Kubernetes v1.32.5

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.4: Kubernetes v1.32.4

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.3: Kubernetes v1.32.3

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.2: Kubernetes v1.32.2

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.32.1: Kubernetes v1.32.1

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot force-pushed the renovate/go-k8s.io-kubernetes-vulnerability branch from 0840b13 to 1cc5324 Compare December 15, 2025 18:03
@renovate renovate bot force-pushed the renovate/go-k8s.io-kubernetes-vulnerability branch from 1cc5324 to 25e056e Compare January 6, 2026 20:35
@renovate renovate bot changed the title fix(deps): update module k8s.io/kubernetes to v1.32.8 [security] fix(deps): update module k8s.io/kubernetes to v1.32.10 [security] Jan 6, 2026
@renovate renovate bot force-pushed the renovate/go-k8s.io-kubernetes-vulnerability branch from 25e056e to 53abfd2 Compare February 3, 2026 20:13
@renovate renovate bot force-pushed the renovate/go-k8s.io-kubernetes-vulnerability branch from 53abfd2 to 99be276 Compare March 14, 2026 17:51
@cla-assistant
Copy link
Copy Markdown

cla-assistant bot commented Mar 14, 2026

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

1 similar comment
@cla-assistant
Copy link
Copy Markdown

cla-assistant bot commented Mar 14, 2026

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants