-
Notifications
You must be signed in to change notification settings - Fork 8.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multiple CVE detected in latest "helm-chart-4.1.0 | ingress-nginx/controller:v1.2.0" release #8520
Comments
Grype confirms it. Please wait till maintainers schedule the update ; ✔ Vulnerability DB [updated] /triage-accepted |
/triage accepted |
We are going to make a new release to fix some bugs, and this will enter in this new release. |
@rikatz could you confirm if the latest release 1.3.0 / 4.2.0 contain these fixes? I couldn't find any CVE reference in the release notes. |
@rikatz @tomasAlabes In short : busybox (used in ssl_client, busybox) version 1.35.0-r14 has 1 vulnerability, Who should we notify for a new build ? |
@DataMinded Which version of Alpine Linux contains this fix? |
I found this alpinelinux/docker-alpine#264 (comment) which says the CVE-2022-30065 is still present in the 3.16.1 image also as per this alpinelinux/docker-alpine#264 (comment) alpine 3.16.1 is supposed to fix GHSA-gq73-rh3m-3php according to the release notes : https://www.alpinelinux.org/posts/Alpine-3.16.1-released.html but still may be present . I am unsure about 3.16.1 having a fix |
|
I also found that NEW version 1.3.0 is impacted by vulnerability of busybox with CVE-2022-30065 |
We have updated to alpine v3.16.1 with patches for busybox & ssl_client. It will be released later. |
Sorry to ask like cause u guys are probably busy with other stuff, but As it concerns a security issue would it not be the best path for a fast release with a fix. (patch/hotfix release , not sure what the correct terminology is here) Just trying to better understand the working method here. Thnx in advance |
@DataMinded true, security based fixes should be sooner than later. In this case, busybox itself is not directly in play while using ingress objects and also ssl_client is used internally to the controller. So this is acceptable risk in the context of the timelines feasible/possible for releasing binaries with patched bits for those 2 CVEs. The situation now is that the already complicated/manual release process gets even more complicated (with cherrypicking needed for tons of stuff etc). not to mention lack of developer time. |
@longwuyuan Thnx allot for the explanation. Indeed I do not know the full context to make that distinction, but that sounds like a good reasoning. |
Thanks! I understand your pain in cherrypicking stuff. Hope to see fixes soon. P.S. From time to time we experience pain (especially in Aliyun Cloud) when Security Center blindly creates Critical Security Incident based on the findings and we have to patch everything ASAP (or at least describe, why busybox won't affect us and provide at least some virtual ETA to fix). |
Yeah, my guess is that the ssl_client vulnerability is causing the busybox CVE as well but not absolutely sure. Because busybox itself is a bunch of stuff. openssl is patches and this CVE points at the ssl_client. So my guess is that the ssl_client binaries do not initiate any connection to out-of-cluster destinations. Unless someone tries to connect to something on internet from inside the controller (like a download instruction etc) Understood the cloud problem. We aim to release as soon as feasible. |
Just as a note, the 4.2.1 release does not contain a fix for this |
Yes, it will appear in app version upgrade. This one is just chart version upgrade. |
Hi @longwuyuan May I know when will the fix version be released? |
Just as a note, Release 4.2.2 & 4.2.3 still do NOT contain a fix for this CVE |
if everything looks good, there will be a discussion on making the release this week or next week. |
Any updated? |
Will start release process.
Thanks,
; Long
…On Fri, 2 Sep, 2022, 8:19 AM Liang Wang, ***@***.***> wrote:
Any updated?
—
Reply to this email directly, view it on GitHub
<#8520 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABGZVWV3BNBKDKCN7GSY5TDV4FTMZANCNFSM5UUI63BQ>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
The controller-v1.3.1 does not contain any CVE's according to Prisma Cloud , Yay |
Guess we can close this issue now, controller-v1.3.1 / helm-chart-4.2.5 resolves the CVE's addressed in OP Thanks for all the help & comments |
Issue Details
Multiple CVE detected in latest "helm-chart-4.1.0" release
Image
k8s.gcr.io/ingress-nginx/controller@sha256:d8196e3bc1e72547c5dec66d6556c0ff92a23f6d0919b206be170bc90d5f918
ID
sha256:04fcc70194086eb9118c8a015dc455c0f7f0249b10346f8b03f97d86ae99fb0c
OS distribution
Alpine Linux v3.14
OS
release3.14.6
Digest
sha256:d8196e3bc1e72547c5dec66d6556c0ff92a23f6d0919b206be170bc90d5f9185
Severity : critical
Package : go
Description : go version 1.17.6 has 5 vulnerabilities
CVE-2022-23806
Fixed in: 1.17.7, 1.16.14
CVE-2022-24675
Fixed in: 1.17.9, 1.8.1
CVE-2022-24921
Fixed in: 1.17.8, 1.16.15
CVE-2022-23772
Fixed in: 1.17.7, 1.16.14
CVE-2022-23773
Fixed in: 1.17.7, 1.16.14
Severity : high
Package : ncurses
Description : ncurses (used in ncurses-libs, ncurses-terminfo-base) version 6.2_p20210612-r0 has 1 vulnerability
CVE-2022-29458
Fixed in: 6.3_p20211120-r0
Severity : low
Package : curl
Description : curl (used in libcurl, curl) version 7.79.1-r0 has 4 vulnerabilities
CVE-2022-27774
Fixed in: 7.79.1-r1
CVE-2022-27775
Fixed in: 7.79.1-r1
CVE-2022-27776
Fixed in: 7.79.1-r1
CVE-2022-22576
Fixed in: 7.79.1-r1
Can someone help me out so we can get a new release , seems a few packages need bumping, help appreciated.
The text was updated successfully, but these errors were encountered: