-
Notifications
You must be signed in to change notification settings - Fork 73
Description
Posting an update: it seems that many people from the community are doing effort on the CVEs for k8s, to my knowledge, today we have:
- The official CVE feed https://kubernetes.io/docs/reference/issues-security/official-cve-feed/ which is automated based on GitHub issues from k/k on CVEs.
- People from Aqua have been motivated to create an OSV feed that takes (amongst other things) the official CVE feed as an input https://github.com/kubernetes-sigs/cve-feed-osv/ which needs manual intervention
- We have govulncheck running in the CI but the result are not really exploited yet Scan
kubernetes/kuberneteswithgovulncheck#95.From the discussions, my understanding is that these projects could unite for a better CVE feed. The main requirement would be for the k8s SRC to have a way to generate the initial source information in OSV format. Indeed, the fact that the automated official CVE feed cannot provide much more information is because we don't have well formed input to consume, detailing for example which versions of k8s are affected (which is an information they provide to SIG release), or which binaries. From what I've been told, the SRC process today is fairly laborious and manual and using OSV could potentially make things simpler.
So I'd love to help to push the initiative forward and see how we can discuss with the SRC to consolidate the information they are already distributing in order to have a structured input for the CVE feeds!