Ciprian Hacman
608be53827
Improve formatting
2020-11-22 07:56:12 +02:00
Alok Kumar Singh
3b2c2314a2
Can use openssl to check cert expiry
2020-11-22 06:58:05 +05:30
Ciprian Hacman
61708eae6b
Rename kops to kOps in the docs
2020-10-29 19:40:53 +02:00
Ciprian Hacman
6a4d86baf9
Rename Kops to kOps in the docs
2020-10-29 19:39:50 +02:00
Ciprian Hacman
40f473a816
Remove hack/workaround from etcd-manager certificate expiration advisory
2020-10-25 10:47:48 +02:00
Peter Rifel
91a68468d9
Add advisory notice to readme and docs homepage
...
also fixing bulleted list on the advisory index page
2020-05-06 21:51:59 -05:00
Peter Rifel
836545d5d3
Add etcd-manager certificate expiration advisory
2020-05-06 03:31:53 -05:00
GuyTempleton
4b41eb2435
Docs: More List fixes
2019-12-11 09:30:33 +00:00
Justin SB
b3baf2080e
Document strategy for cve_2019_5736
...
* kubernetes >= 1.12 - update docker
* kubernetes <= 1.11 - chattr by default, suggest docker update or
runc replacement as alternatives.
2019-02-23 16:54:00 -05:00
SataQiu
0550d8d4e8
fix the typos
2018-10-19 17:35:26 +08:00
yulng
0974583a84
Not Applicable
...
Not Applicable
2018-04-14 16:26:22 +08:00
muhongwei
7278d249b5
fix 'confimap'->'configmap'
2018-03-16 10:59:52 +08:00
AdamDang
02c0115043
Typo delete duplicated "is ", "utilty"->"utility"
...
In "The upgrade is will occur once the channels utilty picks up the change within a
few minutes.", “is” is superfluous.
"utilty" is wrong word, should be utility here.
2018-03-10 10:07:44 +08:00
Tim Hockin
79d5f793e7
Convert registry to k8s.gcr.io
2018-02-14 10:08:41 -08:00
k8s-ci-robot
f749aa5b0c
Merge pull request #4223 from AlexLast/master
...
Removing duplicate AMI entry from Documentation
2018-01-19 00:25:28 -08:00
darron froese
19d8331b1a
Slight typo changes.
...
Just noticed these as I was testing out the rollout.
2018-01-11 14:39:40 -07:00
Alex Last
01b33d6d1f
removing duplicate AMI entry
2018-01-08 09:02:45 +00:00
Justin Santa Barbara
17774c5c9b
Fixes per code review
...
Treat "spectre/meltdown" as one vuln, and stay away from parsing which
CVE is which.
The advisory is that the kernel must be updated, which CVEs are fixed
(or not) are not really the issue.
2018-01-07 23:57:00 -05:00
Justin Santa Barbara
77bf212a3c
Suggest tweaks to meltdown advisory
2018-01-07 23:07:55 -05:00
chrislovecnm
4ab033e1e3
README tweaks from PR reviews
2018-01-07 20:47:38 -07:00
chrislovecnm
0d7fc68fcc
pr review udpates
2018-01-07 20:45:35 -07:00
chrislovecnm
9b77d88c1a
Adding cve updates for spectre and meltdown
...
This advisory covers the following 3 CVEs, Variant 1 and 3 are currently
resolved.
Variant 1: bounds check bypass (CVE-2017-5753)
Variant 2: branch target injection (CVE-2017-5715)
Variant 3: rogue data cache load (CVE-2017-5754)
2018-01-07 18:18:44 -07:00
Jasmine Hegman
1a9a5351d0
Added example output from a 1.4.12 cluster
2017-10-19 15:15:46 -07:00
William Austin
a21dfafa0d
Add missing "-nanny" in image name.
2017-10-16 10:29:34 -06:00
chrislovecnm
8792823ad9
Fixing english per PR review
2017-10-10 12:20:19 -06:00
chrislovecnm
97d0305fdf
tweaks
2017-10-09 20:59:36 -06:00
chrislovecnm
fdb4670d61
updating cve advisory for kops-1.7.1 release
2017-10-09 20:52:27 -06:00
Chris Love
6d0cefcec8
Fixed table
2017-10-08 15:12:03 -06:00
chrislovecnm
ed3651d688
CVE-2017-14491 Documentation Hot Fixes and kops fixes
2017-10-08 14:53:55 -06:00