Skip to content

Conversation

rexagod
Copy link
Member

@rexagod rexagod commented Aug 28, 2025

In an attempt to reduce the ticket churn we see from third-party detectors.

/cc @mrueg

@k8s-ci-robot k8s-ci-robot requested a review from mrueg August 28, 2025 17:59
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Aug 28, 2025
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: rexagod

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. labels Aug 28, 2025
@k8s-ci-robot
Copy link
Contributor

This issue is currently awaiting triage.

If kube-state-metrics contributors determine this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@github-project-automation github-project-automation bot moved this to Needs Triage in SIG Instrumentation Aug 28, 2025
@k8s-ci-robot k8s-ci-robot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Aug 28, 2025
name: CVE report
about: Report a CVE detected in kube-state-metrics main branch
title: ''
labels: kind/cve
Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Introduced a new label to keep CVEs away from kind/bugs categorisation.

In an attempt to reduce the ticket churn we see from third-party
detectors.

Signed-off-by: Pranshu Srivastava <[email protected]>
@rexagod rexagod moved this from Needs Triage to Needs Review (PR) or SIG Response (Issue) in SIG Instrumentation Aug 28, 2025
-->

<!-- `govulncheck` data should include the command ran and should clearly mention the CVE in question in the logs -->

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let's add a checklist here

Suggested change
[ ] I am aware that output from other scanners is high likely a false positive and the issue will be marked as spam.
[ ] I have verified that govulncheck reports the vulnerability in the latest main


* kube-state-metrics version:
* Kubernetes version (use `kubectl version`):
* Cloud provider or hardware configuration:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this needed for CVEs?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. size/M Denotes a PR that changes 30-99 lines, ignoring generated files.
Projects
Status: Needs Review (PR) or Response (Issue)
Development

Successfully merging this pull request may close these issues.

3 participants