-
Notifications
You must be signed in to change notification settings - Fork 2.1k
chore: Add CVE template #2752
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
chore: Add CVE template #2752
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: rexagod The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
This issue is currently awaiting triage. If kube-state-metrics contributors determine this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
name: CVE report | ||
about: Report a CVE detected in kube-state-metrics main branch | ||
title: '' | ||
labels: kind/cve |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Introduced a new label to keep CVEs away from kind/bug
s categorisation.
In an attempt to reduce the ticket churn we see from third-party detectors. Signed-off-by: Pranshu Srivastava <[email protected]>
217aef6
to
973d7fc
Compare
--> | ||
|
||
<!-- `govulncheck` data should include the command ran and should clearly mention the CVE in question in the logs --> | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's add a checklist here
[ ] I am aware that output from other scanners is high likely a false positive and the issue will be marked as spam. | |
[ ] I have verified that govulncheck reports the vulnerability in the latest main |
|
||
* kube-state-metrics version: | ||
* Kubernetes version (use `kubectl version`): | ||
* Cloud provider or hardware configuration: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this needed for CVEs?
In an attempt to reduce the ticket churn we see from third-party detectors.
/cc @mrueg