Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

OCPBUGS-46260: CVE-2024-45337 bump crypto pkg to v0.31.0 #9314

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

patrickdillon
Copy link
Contributor

The installer does not run any ssh servers or use ServerConfig.PublicKeyCallback, so is not affected by CVE-2024-45337 , but we might as well upgrade to the safe version to avoid any potential confusion from scanners. We will fix this at main, but don't plan any backports (as we are not actually vulnerable).

The installer does not run any ssh servers or use
ServerConfig.PublicKeyCallback, so is not affected
by CVE-2024-45337, but we might as well upgrade
to the safe version to avoid any potential confusion
from scanners.

go mod edit -require=golang.org/x/[email protected]
go mod tidy && go mod vendor
@openshift-ci-robot openshift-ci-robot added jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type. labels Dec 12, 2024
@openshift-ci-robot
Copy link
Contributor

@patrickdillon: This pull request references Jira Issue OCPBUGS-46260, which is invalid:

  • expected the vulnerability to target either version "4.19." or "openshift-4.19.", but it targets "4.18.0" instead

Comment /jira refresh to re-evaluate validity if changes to the Jira bug are made, or edit the title of this pull request to link to a different bug.

The bug has been updated to refer to the pull request using the external bug tracker.

In response to this:

The installer does not run any ssh servers or use ServerConfig.PublicKeyCallback, so is not affected by CVE-2024-45337 , but we might as well upgrade to the safe version to avoid any potential confusion from scanners. We will fix this at main, but don't plan any backports (as we are not actually vulnerable).

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot added the jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. label Dec 12, 2024
@openshift-ci openshift-ci bot requested review from rna-afk and sadasu December 12, 2024 19:22
@patrickdillon
Copy link
Contributor Author

/jira refresh

@openshift-ci-robot openshift-ci-robot added the jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. label Dec 12, 2024
@openshift-ci-robot
Copy link
Contributor

@patrickdillon: This pull request references Jira Issue OCPBUGS-46260, which is valid. The bug has been moved to the POST state.

3 validation(s) were run on this bug
  • bug is open, matching expected state (open)
  • bug target version (4.19.0) matches configured target version for branch (4.19.0)
  • bug is in the state New, which is one of the valid states (NEW, ASSIGNED, POST)

Requesting review from QA contact:
/cc @gpei

In response to this:

/jira refresh

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the openshift-eng/jira-lifecycle-plugin repository.

@openshift-ci-robot openshift-ci-robot removed the jira/invalid-bug Indicates that a referenced Jira bug is invalid for the branch this PR is targeting. label Dec 12, 2024
@openshift-ci openshift-ci bot requested a review from gpei December 12, 2024 19:26
Copy link
Contributor

openshift-ci bot commented Dec 12, 2024

@patrickdillon: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/okd-scos-e2e-aws-ovn 42166af link false /test okd-scos-e2e-aws-ovn

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

Copy link
Contributor

@barbacbd barbacbd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

/approve

Copy link
Contributor

openshift-ci bot commented Dec 17, 2024

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: barbacbd

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Dec 17, 2024
@r4f4
Copy link
Contributor

r4f4 commented Dec 17, 2024

Do we care about the crypto version used by terraform and cluster-api + providers?

$ fd -e mod -x rg -l "golang\.org/x/crypto v"
./go.mod
./terraform/terraform/go.mod
./terraform/providers/ignition/go.mod
./cluster-api/cluster-api/go.mod
./terraform/providers/azurestack/go.mod
./terraform/providers/ibm/go.mod
./cluster-api/providers/nutanix/go.mod
./cluster-api/providers/ibmcloud/go.mod
./cluster-api/providers/azureaso/go.mod
./cluster-api/providers/aws/go.mod
./cluster-api/providers/azure/go.mod
./cluster-api/providers/gcp/go.mod

$ fd -e mod -x rg "golang\.org/x/crypto v"
	golang.org/x/crypto v0.29.0
	golang.org/x/crypto v0.14.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.14.0 // indirect
	golang.org/x/crypto v0.29.0 // indirect
	golang.org/x/crypto v0.15.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.19.0 // indirect
	golang.org/x/crypto v0.24.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.14.0 // indirect

@patrickdillon
Copy link
Contributor Author

Do we care about the crypto version used by terraform and cluster-api + providers?

$ fd -e mod -x rg -l "golang\.org/x/crypto v"
./go.mod
./terraform/terraform/go.mod
./terraform/providers/ignition/go.mod
./cluster-api/cluster-api/go.mod
./terraform/providers/azurestack/go.mod
./terraform/providers/ibm/go.mod
./cluster-api/providers/nutanix/go.mod
./cluster-api/providers/ibmcloud/go.mod
./cluster-api/providers/azureaso/go.mod
./cluster-api/providers/aws/go.mod
./cluster-api/providers/azure/go.mod
./cluster-api/providers/gcp/go.mod

$ fd -e mod -x rg "golang\.org/x/crypto v"
	golang.org/x/crypto v0.29.0
	golang.org/x/crypto v0.14.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.14.0 // indirect
	golang.org/x/crypto v0.29.0 // indirect
	golang.org/x/crypto v0.15.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.19.0 // indirect
	golang.org/x/crypto v0.24.0 // indirect
	golang.org/x/crypto v0.25.0 // indirect
	golang.org/x/crypto v0.14.0 // indirect

Good question. I did search through the vendored code to ensure that none of the packages are vulnerable, so it is not critical that we update.

But thinking about it fresh after your question, it would be best imho to approach it upstream as we are here. We should bump the packages in the upstream repos (at least capi), like we are doing in the installer. I will add this as a task for our incoming intern.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. jira/severity-important Referenced Jira bug's severity is important for the branch this PR is targeting. jira/valid-bug Indicates that a referenced Jira bug is valid for the branch this PR is targeting. jira/valid-reference Indicates that this PR references a valid Jira ticket of any type.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants