Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability CVE-2023-44487 in NGINX 1.21.6 reported for controller-v1.9.6 #11473

Closed
giri624 opened this issue Jun 17, 2024 · 7 comments
Closed
Assignees
Labels
kind/bug Categorizes issue or PR as related to a bug. needs-priority needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one.

Comments

@giri624
Copy link

giri624 commented Jun 17, 2024

What scanner and version reported the CVE?
Protecode scanner

What CVE was reported in the scanner findings?
CVE-2023-44487

What versions of the controller did you test with?
controller-v1.9.6

We are facing CVE-2023-44487 being reported in our recent Protecode scans. The nginx version used is 1.21.6 and in the issue #10768 it is mentioned that updating nginx to 1.25.3 or higher is needed to address this vulnerability. But I have seen in this README where it is stated not to use version 1.25.3.

Also the patch nginx-1.21.4-http2.patch mentioned in the #10662 comment is already being applied.

Could you please help to address this vulnerability without updating nginx to 1.25.3?

@giri624 giri624 added the kind/bug Categorizes issue or PR as related to a bug. label Jun 17, 2024
@k8s-ci-robot k8s-ci-robot added the needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one. label Jun 17, 2024
@k8s-ci-robot
Copy link
Contributor

This issue is currently awaiting triage.

If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@rikatz
Copy link
Contributor

rikatz commented Jun 17, 2024

/close

Please use version 1.10

@k8s-ci-robot
Copy link
Contributor

@rikatz: Closing this issue.

In response to this:

/close

Please use version 1.10

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@giri624
Copy link
Author

giri624 commented Jun 17, 2024

/close

Please use version 1.10

Thank you for the reply, but version 1.10 also uses nginx version 1.21.6 right? which still have the above vulnerability?

@rikatz
Copy link
Contributor

rikatz commented Jun 17, 2024

No, it uses NGINX 1.25, please check the matrix table on README file

@giri624
Copy link
Author

giri624 commented Jun 17, 2024

No, it uses NGINX 1.25, please check the matrix table on README file

Thank you. Is safe to use nginx 1.25.3 in production? because it is mentioned that it is not safe in this README

@rikatz
Copy link
Contributor

rikatz commented Jun 17, 2024

It is safe

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Categorizes issue or PR as related to a bug. needs-priority needs-triage Indicates an issue or PR lacks a `triage/foo` label and requires one.
Projects
Development

No branches or pull requests

4 participants