gpu-operator icon indicating copy to clipboard operation
gpu-operator copied to clipboard

gpu-operator image - nvcr.io/nvidia/gpu-operator:v23.9.1 - Critical Vulnerabilities Found

Open zohebk8s opened this issue 1 year ago • 3 comments

Hi Team,

I've deployed an NVIDIA GPU Operator in Azure AKS 1.27.7. The pods are up/running.

However, I see critical vulnerabilities in "gpu-operator" image. Please have a look at it. Looks like the fixes are not available for these components.

image

Runtime Analysis Details:

image

The reason behind raising this issue is, in some organizations: Applications that contain critical vulnerabilities won't be considered unless it is fixed/patched. In this case, the fix is not available but still, I just thought of getting your feedback/take on this.

zohebk8s avatar Mar 03 '24 09:03 zohebk8s

Hi Team,

Any feedback or comments on this?

zohebk8s avatar Mar 05 '24 07:03 zohebk8s

Security Scanning provided by NGC show a different status:

https://catalog.ngc.nvidia.com/orgs/nvidia/containers/gpu-operator/security?tag=v23.9.1&architecture=amd64 image

There is no critical vulnerability reported by Anchore which is the tool used by NGC.

We checked internally with our security team and below the feedback:

"This is most likely due to the different prioritization of vulnerability feeds. We use feeds closer to the packages before we use NVD.

  1. Code repo-specific security data (e.g. GHSA)
  2. Distro specific feeds
  3. NVD if package not covered by #2 or #1.

This has proven to be the most accurate representation of the severity.

It looks like the first scanner uses the severity from NVD (critical), where Anchore use a distro feed (Canonical has this as disputed/ low [https://ubuntu.com/security/CVE-2019-1010022]) "

francisguillier avatar Mar 06 '24 01:03 francisguillier

@francisguillier Thanks for sharing valuable information on this.

Appreciate your input and support.

zohebk8s avatar Mar 06 '24 06:03 zohebk8s