chore: git cache cleanup
This commit is contained in:
63
docs/security/archive/SECURITY-EXCEPTION-nebula-v1.9.7.md
Normal file
63
docs/security/archive/SECURITY-EXCEPTION-nebula-v1.9.7.md
Normal file
@@ -0,0 +1,63 @@
|
||||
# Security Exception: Nebula v1.9.7 (GHSA-69x3-g4r3-p962)
|
||||
|
||||
**Date:** 2026-02-10
|
||||
**Status:** ACCEPTED RISK
|
||||
**CVE:** GHSA-69x3-g4r3-p962
|
||||
**Severity:** High
|
||||
**Package:** github.com/slackhq/nebula@v1.9.7
|
||||
**Fixed Version:** v1.10.3
|
||||
|
||||
## Decision
|
||||
Accept the High severity vulnerability in nebula v1.9.7 as a documented known issue.
|
||||
|
||||
## Rationale
|
||||
- Nebula is a transitive dependency via CrowdSec bouncer -> ipstore chain
|
||||
- Upgrading to v1.10.3 breaks compilation:
|
||||
- smallstep/certificates removed nebula APIs (NebulaCAPool, NewCAPoolFromBytes, etc.)
|
||||
- ipstore missing GetAndDelete method compatibility
|
||||
- No compatible upstream versions exist as of 2026-02-10
|
||||
- Patching dependencies during build is high-risk and fragile
|
||||
- High severity risk classification applies to vulnerabilities within our control
|
||||
- This is an upstream dependency management issue beyond our immediate control
|
||||
|
||||
## Dependency Chain
|
||||
- Caddy (xcaddy builder)
|
||||
- github.com/hslatman/caddy-crowdsec-bouncer@v0.9.2
|
||||
- github.com/hslatman/ipstore@v0.3.0
|
||||
- github.com/slackhq/nebula@v1.9.7 (vulnerable)
|
||||
|
||||
## Exploitability Assessment
|
||||
- Nebula is present in Docker image build artifacts
|
||||
- Used by CrowdSec bouncer for IP address management
|
||||
- Attack surface: [Requires further analysis - see monitoring plan]
|
||||
|
||||
## Monitoring Plan
|
||||
Watch for upstream fixes in:
|
||||
- github.com/hslatman/caddy-crowdsec-bouncer (primary)
|
||||
- github.com/hslatman/ipstore (secondary)
|
||||
- github.com/smallstep/certificates (nebula API compatibility)
|
||||
- github.com/slackhq/nebula (direct upgrade if dependency chain updates)
|
||||
|
||||
Check quarterly (or when Dependabot/security scans alert):
|
||||
- CrowdSec bouncer releases: https://github.com/hslatman/caddy-crowdsec-bouncer/releases
|
||||
- ipstore releases: https://github.com/hslatman/ipstore/releases
|
||||
- smallstep/certificates releases: https://github.com/smallstep/certificates/releases
|
||||
|
||||
## Remediation Trigger
|
||||
Revisit and remediate when ANY of:
|
||||
- caddy-crowdsec-bouncer releases version with nebula v1.10.3+ support
|
||||
- smallstep/certificates releases version compatible with nebula v1.10.3
|
||||
- ipstore releases version fixing GetAndDelete compatibility
|
||||
- GHSA-69x3-g4r3-p962 severity escalates to CRITICAL
|
||||
- Proof-of-concept exploit published targeting Charon's attack surface
|
||||
|
||||
## Alternative Mitigation (Future)
|
||||
If upstream remains stalled:
|
||||
- Consider removing CrowdSec bouncer plugin (loss of CrowdSec integration)
|
||||
- Evaluate alternative IP blocking/rate limiting solutions
|
||||
- Implement CrowdSec integration at reverse proxy layer instead of Caddy
|
||||
|
||||
## References
|
||||
- CVE Details: https://github.com/advisories/GHSA-69x3-g4r3-p962
|
||||
- Analysis Report: [docs/reports/nebula_upgrade_analysis.md](../reports/nebula_upgrade_analysis.md)
|
||||
- Version Test Results: [docs/reports/nebula_upgrade_analysis.md](../reports/nebula_upgrade_analysis.md#6-version-compatibility-test-results)
|
||||
Reference in New Issue
Block a user