This repository was archived by the owner on Mar 24, 2026. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 8.5k
Controller image CVE-2025-15467 from openssl #14482
Copy link
Copy link
Closed
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.needs-priorityneeds-triageIndicates an issue or PR lacks a `triage/foo` label and requires one.Indicates an issue or PR lacks a `triage/foo` label and requires one.
Description
Reported in Google Cloud's Security command center and Docker scout v1.19.0. To reproduce:
docker scout cves registry.k8s.io/ingress-nginx/controller:v1.14.2
The ingress-nginx/controller:v1.14.2 image contains openssl version 3.5.4-r0 which has recently disclosed several CVEs but the most notable is the Critical CVE-2025-15467 which can potentially allow for Remote Code Execution.
- https://nvd.nist.gov/vuln/detail/CVE-2025-15467
- https://securitylabs.datadoghq.com/articles/openssl-january-2026-security-update-cms-and-pkcs12-buffer-overflows/#how-to-know-if-you-are-affected
Is the ingress-nginx controller potentially vulnerable to this through its use of openssl? If so, is there some configuration of the controller that would mitigate the issue?
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
kind/bugCategorizes issue or PR as related to a bug.Categorizes issue or PR as related to a bug.needs-priorityneeds-triageIndicates an issue or PR lacks a `triage/foo` label and requires one.Indicates an issue or PR lacks a `triage/foo` label and requires one.
Type
Projects
Status
Done