Skip to content

Calico Update overview.md #262

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open

Conversation

riyac12
Copy link
Contributor

@riyac12 riyac12 commented Jun 25, 2025

added bulletin for Calico mirroring

added bulletin for Calico mirroring
Copy link
Contributor

@riyac12 : Thanks for your contribution! The author(s) and reviewer(s) have been notified to review your proposed change. @Bahe

Copy link
Contributor

Learn Build status updates of commit 69ad706:

✅ Validation status: passed

File Status Preview URL Details
articles/aks/security-bulletins/overview.md ✅Succeeded

For more details, please refer to the build report.

**Published Date**: June 25, 2025

### Description
This bulletin provides an update on the security patching model for Calico in Azure Kubernetes Service (AKS). AKS-managed Calico is now fully aligned with upstream [Calico releases](https://github.com/projectcalico/calico/releases). This means that AKS will no longer independently patch Calico images but will instead mirror upstream Calico builds directly.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

technically these reelases as well https://github.com/tigera/operator/releases

### Description
This bulletin provides an update on the security patching model for Calico in Azure Kubernetes Service (AKS). AKS-managed Calico is now fully aligned with upstream [Calico releases](https://github.com/projectcalico/calico/releases). This means that AKS will no longer independently patch Calico images but will instead mirror upstream Calico builds directly.

As a result, CVEs affecting Calico will remain unpatched in AKS until a fix is available upstream. This change ensures consistency with upstream behavior and improves transparency in patch timelines.
Copy link
Contributor

@paulgmiller paulgmiller Jun 25, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we also point out that upstream might choose not to fix an CVE if they deem it as not effecting their product?

#### [**AKS Cluster**](#tab/aks-cluster)

**Affected Versions**
- All AKS supported versions using AKS managed Calico
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

mention calico was never supported for lts?

- All AKS supported versions using AKS managed Calico

**Resolutions**
No immediate action is required. Customers are encouraged to monitor upstream Calico releases and the [AKS CVE Status Tracker](https://releases.aks.azure.com/webpage/index.html) for updates.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addthis? If this creates an unreasonable security burdon customers may remove calico by setting netowkr policy to none https://learn.microsoft.com/en-us/azure/aks/use-network-policies#uninstall-azure-network-policy-manager-or-calico


As a result, CVEs affecting Calico will remain unpatched in AKS until a fix is available upstream. This change ensures consistency with upstream behavior and improves transparency in patch timelines.

### References
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Assume its not worth it/bad to mention we don't do this because of the complexitity of some of calico nodes image builds. I've been pretty transparent tigera about this so I don't think they would take offense but assume we don't normally give reasons.

@v-regandowner
Copy link
Contributor

@bcho - Can you review the proposed changes?

IMPORTANT: When the changes are ready for publication, adding a #sign-off comment is the best way to signal that the PR is ready for the review team to merge.

#label:"aq-pr-triaged"
@MicrosoftDocs/public-repo-pr-review-team

Copy link

This pull request has been inactive for at least 14 days. If you are finished with your changes, don't forget to sign off. See the contributor guide for instructions.
Get Help
Docs Support Teams Channel
Resolve Merge Conflict

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants