@K-Phoen Hi, I'm wondering if you can do some update of the action - go.sum file?
Remediation
Upgrade gopkg.in/yaml.v2 to version 2.2.8 or later. For example:
require gopkg.in/yaml.v2 v2.2.8
CVE-2019-11254
Vulnerable versions: < 2.2.8
Patched version: 2.2.8
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
@K-Phoen Hi, I'm wondering if you can do some update of the action - go.sum file?
Remediation Upgrade gopkg.in/yaml.v2 to version 2.2.8 or later. For example: require gopkg.in/yaml.v2 v2.2.8
CVE-2019-11254 Vulnerable versions: < 2.2.8 Patched version: 2.2.8 The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.