-
Notifications
You must be signed in to change notification settings - Fork 68
Security Vulnerabilities found in secrets-store-csi-driver-provider-gcp #242
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Could anyone please update on this? |
Thank you for reporting this issue! We have added this to our roadmap and will look into it. As you have pointed out, it looks like most of these vulnerabilities can indeed be fixed via configuration changes. However, we will need to do extensive testing of the provider and the driver to make sure there is no impact on functionality due to these changes. |
[Progress Comment] Below are the provider fixes for the configurations: Do not share the host's network namespace Mount container's root filesystem as read only Do not share the host's UTS namespace Do not disable default seccomp profile Use PIDs cgroup limit Container is running as root Restrict container from acquiring additional privileges Do not set mount propagation mode to shared Do not use privileged containers Verify AppArmor profile, if applicable A few are in progress and we are constantly looking into that. Till then could you please verify the fixes from your end by running benchmarking tools at your end. Soon we will discuss vulnerabilities and configuration fixes with our dependencies e.g. driver, livenessprobe ... |
Hello @NaMNDV Thank you for the information. Could you please verify the release version in which the mentioned vulnerabilities have been addressed? We will conduct testing based on that information to confirm the resolution. |
Sure, it's 1.4.0 |
Greetings team, We've noticed that the secrets-store-csi-driver.yaml includes the securityContext option:
However, its default values are not currently present in the values.yaml file for easy overriding. Could you please include it in the default values.yaml file so that it can be overridden externally & we can test it? And also confirm about this vulnerability "Verify AppArmor profile, if applicable" whether its fixed or not in 1.4.0 release @NaMNDV |
Thanks @jagtapa for pointing this out. I'll raise a PR to update the driver: https://github.com/kubernetes-sigs/secrets-store-csi-driver/blob/main/charts/secrets-store-csi-driver/templates/secrets-store-csi-driver.yaml and corresponding values.yaml: https://github.com/kubernetes-sigs/secrets-store-csi-driver/blob/main/charts/secrets-store-csi-driver/values.yaml also the manifest_staging: https://github.com/kubernetes-sigs/secrets-store-csi-driver/tree/main/manifest_staging charts Regarding AppArmor profile: The AppArmor profile is not applicable and is not applied in 1.4.0 release |
kubernetes-sigs/secrets-store-csi-driver#1469 (review) the security configuration is a hard-requirement for the driver and can not be changed. The driver won't work by configuring this with other values of securityContext.privilaged . Thus we can not make the security context configurable. If future has some other configurable fields in the securityContext, we may think of this approach later. |
I concur with your point that setting this flag to true is necessary. We also need to incorporate additional parameters into the securityContext. However, because the option below
is absent in the default values file, we are unable to add or test other security parameters. It's important to note that we should not modify Please share your thoughts on this matter. |
Description
We are using secrets-store-csi-driver-provider-gcp to fetch sensitive data from GCP secret manager into our application.
This application is mission critical and has been running in production since couple months.
As a part of CIS benchmarks, we need to run different scans on the runtime Prisma Cloud (from PaloAlto networks) has detected following vulnerabilities.
We would like to know if these can be fixed or already fixed in any future releases.
If it is fixed via configuration (changes in helm values), would it affect any functionality or working of csi-driver?
Vulnerabilities:
Specifications
The text was updated successfully, but these errors were encountered: