-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disable HTTP/2 by Default for Metrics endpoint to Mitigate CVE Risks #11764
Comments
This issue is currently awaiting triage. If CAPI contributors determine this is a relevant issue, they will accept it by applying the The Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
Wondering if this should be discussed on the controller-runtime level |
Hi @sbueringer, |
I think that would be good |
Same answer as on: kubernetes-sigs/controller-runtime#3096 (comment) /close @anshuman-agarwala Let us know if we're missing something |
@sbueringer: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What would you like to be added (User Story)?
There is a security vulnerability in golang/net which can allow malicious authorized clients to DOS the kube-apiserver.
More information can be found in kubernetes/kubernetes#121197
Detailed Description
The workaround for this issue that other projects have adopted is to make http/2 optional using a flag.
More information about the cve:
GHSA-qppj-fm5r-hxr3
GHSA-4374-p667-p6c8
Anything else you would like to add?
No response
Label(s) to be applied
/kind feature
One or more /area label. See https://github.com/kubernetes-sigs/cluster-api/labels?q=area for the list of labels.
The text was updated successfully, but these errors were encountered: