Skip to content

Conversation

@cx-adar-zandberg
Copy link
Contributor

Summary

This PR fixes security vulnerabilities identified in the following Jira tickets:

  • AST-123981 - CVE-2019-25210 @ helm v3.19.2 (DISPUTED - vendor says intentional behavior, no fix needed)
  • AST-123980 - CVE-2025-64329 @ containerd v2.1.2 ✅ Fixed: upgraded to v2.1.5
  • AST-123302 - CVE-2025-31133 @ runc v1.2.3 ✅ Fixed: upgraded to v1.3.3
  • AST-123300 - CVE-2025-52565 @ runc v1.2.3 ✅ Fixed: upgraded to v1.3.3
  • AST-123298 - CVE-2025-52881 @ runc v1.2.3 ✅ Fixed: upgraded to v1.3.3
  • AST-120967 - CVE-2024-25621 @ containerd v2.1.2 ✅ Fixed: upgraded to v2.1.5
  • AST-116271 - CVE-2025-27144 @ go-jose v2.6.3 ⚠️ No fix available (v2 branch has no patch, pulled by k8s.io/apiserver)
  • AST-108828 - CVE-2025-46569 @ OPA v0.70.0 ✅ Fixed: upgraded to v1.4.2

Changes

  • Updated replace directive for github.com/containerd/containerd/v2 from v2.1.4 to v2.1.5
  • Added replace directive for github.com/open-policy-agent/opa to v1.4.2
  • github.com/opencontainers/runc was already at v1.3.3 (patched version)

Notes

  1. CVE-2019-25210 (helm): This is a disputed CVE. The vendor's position is that the behavior was introduced intentionally and cannot be removed without breaking backwards compatibility.

  2. CVE-2025-27144 (go-jose v2): There is no patch available for the v2 branch of go-jose. The v2 package is pulled as a transitive dependency from k8s.io/apiserver. The fix would require kubernetes to update their dependencies to go-jose v3 or v4.

Testing

  • go build ./... - Build successful
  • go test ./... - All tests pass

Pull Request opened by Augment Code with guidance from the PR author

- containerd/v2: v2.1.4 -> v2.1.5 (fixes CVE-2025-64329, CVE-2024-25621)
- open-policy-agent/opa: v0.70.0 -> v1.4.2 (fixes CVE-2025-46569)
- runc: already at v1.3.3 (fixes CVE-2025-31133, CVE-2025-52565, CVE-2025-52881)

Jira tickets: AST-123981, AST-123980, AST-123302, AST-123300, AST-123298, AST-120967, AST-116271, AST-108828

Note: CVE-2019-25210 (helm) is disputed by vendor as intentional behavior.
Note: CVE-2025-27144 (go-jose v2) has no fix available for v2 branch - dependency is pulled by k8s.io/apiserver.
@cx-shaked-karta
Copy link
Contributor

cx-shaked-karta commented Jan 29, 2026

Logo
Checkmarx One – Scan Summary & Details86cd4f0e-7b34-4326-a568-6006955a2a06

Great job! No new security vulnerabilities introduced in this pull request


Use @Checkmarx to interact with Checkmarx PR Assistant.
Examples:
@Checkmarx how are you able to help me?
@Checkmarx rescan this PR

- Upgraded Microsoft/hcsshim from v0.13.1-0.20250731174403 to v0.14.0-rc.1
- This helps SCA scanners better detect the replaced versions
- Also upgraded spf13/viper to v1.20.1

Note: The vulnerable packages (containerd/v2, runc, opa) are transitive
dependencies from hcsshim. The replace directives override these at build
time, but SCA scanners may still report the declared versions from
hcsshim's go.mod. Configure your SCA scanner to respect Go replace
directives or use govulncheck for accurate vulnerability detection.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants