calico
calico copied to clipboard
CVEs found in calico/node
Our Security Scanning tools have identified CVE in one of your projects calico/node. Can you please review this and provide update on following:
-
Documentation that explains the mitigation strategy that we can apply to reduce the severity level -
Details on when is this going to be fixed with the expected version number
CVE Reported: CVE-2020-8561: A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10; they can view the redirected responses and headers in the logs.
Calico version in use: 3.23.3
Calico is not affected by this CVE. It should be resolved in a future Calico release by updating the Kubernetes version that we pin to.
I thought we fixed this with: https://github.com/projectcalico/calico/security/dependabot/14 It looks like Calico v3.23 and v3.24 are pinned to recent enough versions of k8s that have resolved the CVE.
Going to close this for now, but please reopen the issue if you have further questions.