tigera / operator

Kubernetes operator for installing Calico and Calico Enterprise
Apache License 2.0
184 stars 139 forks source link

CVEs reported in v1.25.37 #2116

Closed jignesh01 closed 4 days ago

jignesh01 commented 2 years ago

Our Security Scanning tools have identified Medium CVE in tigera operator. Can you please review this and help us with an update on following:

  1. Documentation that explains the mitigation strategy that we can apply to reduce the severity level
  2. Details on when is this going to be fixed with the expected version number and if its already fixed which version number is it fixed in.

CVEs reported:

CVEs found in version: v1.25.37

codechris1 commented 2 years ago

Hello Tigera operator team is there any update in this Issue?. Thank you!

jignesh01 commented 1 year ago

Hello team,

Is there any update on this?

tmjd commented 1 year ago

The version specified in the initial message does not exist but I think the currently released (prior to Oct 31, 2022) versions do include versions of the aws-sdk-go prior to v1.34.0 (That version fixes both CVEs resported) so do utilize the vulnerable code.

The code that uses the aws-sdk-go library is only utilized when using OpenShift on AWS, so if you are not using both of those then the impacted code is not used. If you are running on OpenShift on AWS there is probably no attack vector as the code runs as a one time Job that ensures AWS Security groups allow the traffic that Calico needs and then the Job is done.

The library has been updated in master to v1.44 so hopefully the CVEs should not be alerted.

I hope this helps.

tmjd commented 4 days ago

Newer versions have addressed this.