Security vulnerabilities
Review how the kgateway project handles the lifecycle of Common Vulnerability and Exposures (CVEs).
Reports
The kgateway project appreciates the efforts of our users in helping us to discover and resolve security vulnerabilities. The following sources are used to determine product exposure to CVEs:
- The kgateway team scans kgateway components to detect vulnerabilities.
- The kgateway team participates in early disclosure and security workgroups of multiple upstream communities.
- Users may share output from their own security scanning tools for analysis and response from the kgateway team.
π¨ Where to report
To report a security vulnerability, email the private Google group [email protected]
.
β When to send a report
Send a report when:
- You discover that a kgateway component has a potential security vulnerability.
- You are unsure whether or how a vulnerability affects kgateway.
π Check before sending
If in doubt, send a private message about potential vulnerabilities such as:
- Any crash, especially in Envoy.
- Any potential Denial of Service (DoS) attack.
β When NOT to send a report
Do not send a report for vulnerabilities that are not part of the kgateway project, such as:
- You want help configuring kgateway components for security purposes.
- You want help applying security related updates to your kgateway configuration or environment.
- Your issue is not related to security vulnerabilities.
- Your issue is related to base image dependencies, such as Envoy.
Evaluation
The kgateway team evaluates vulnerability reports for:
- Severity level, which can affect the priority of the fix
- Impact of the vulnerability on kgateway code as opposed to upstream code
- Potential dependencies on third-party or upstream code that might delay the remediation process
The kgateway team strives to keep private any vulnerability information with us as part of the remediation process. We only share information on a need-to-know basis to address the issue.
Remediation
Remediation of a CVE involves introducing a fix to the affected code and releasing the associated component. This development process might happen in private GitHub repositories to keep information secure and prevent broader exploitation of the vulnerability.
Disclosures
The kgateway team discloses remediated vulnerabilities publicly. Additionally, you can join an early disclosure group to help address vulnerabilities earlier in the remediation process.
Public disclosure
On the day for the remediation to be disclosed, the kgateway team takes steps that might include the following:
- Merge changes from any private repositories into the public codebase
- Share security scan results for product images
- Publish a release and any corresponding documentation for mitigating the vulnerability
- Announce the remediated vulnerability in a public channel such as email or Slack
Early disclosure
You can join a distribution list to get early disclosures of security vulnerability. This way, you can take action earlier in the process to help remediate the vulnerability and mitigate its effects in your environments.
To request membership in the early disclosure group, email the private Google group [email protected]
. In your request, indicate how you meet the following membership criteria.
Membership criteria
- Contribute significantly to the kgateway project, such as by being a maintainer, release manager, or active feature developer.
- Use kgateway in a way that justifies early disclosure of security vulnerabilities, such as redistributing kgateway or providing kgateway to many users outside your own organization.
- Monitor the email that you provide for the early disclosure distribution list.
- Participate in and attend meetings of the security working group.
- Keep any information from the distribution list private and on a need-to-know basis. Information is only for purposes of remediating the vulnerability. If you share information beyond the scope of this policy, you must notify the distribution list, including details of what information was shared when and to whom, so the kgateway team can assess how to proceed.
Membership removal
You must actively meet the membership criteria to remain part of the early disclosure distribution list. If your organization stops meeting one or more of these criteria, you can be removed from the distribution list.
Other membership notes
Membership in the Envoy security group is a separate process. Because kgateway integrates closely with the Envoy project, you might also consider joining the Envoy early disclosure group. Even if not, you are still expected to abide by their embargo policy when a kgateway vulnerability relates to the Envoy project.
Updates and questions
The kgateway team reserves the right to change this process. The kgateway teamβs security processes are reviewed regularly to ensure compliance with industry standards and the current security landscape. For questions or additional details, email the private Google group [email protected]
.