Skip to content

streamline CVE handling in SCS-0210 with SCS-0124#1099

Closed
fkr wants to merge 5 commits intomainfrom
feat/streamline-kaas-cve-with-iaas
Closed

streamline CVE handling in SCS-0210 with SCS-0124#1099
fkr wants to merge 5 commits intomainfrom
feat/streamline-kaas-cve-with-iaas

Conversation

@fkr
Copy link
Copy Markdown
Member

@fkr fkr commented Feb 17, 2026

In SCS-0124 we write:

Critical (CVSS = 9.0 – 10.0): 3 hours
High (CVSS = 7.0 – 8.9): 3 days
Mid (CVSS = 4.0 – 6.9): 1 month
Low (CVSS = 0.1 – 3.9): 3 months

Our Policies should be the same where possible, so adjust this to match IaaS.

In SCS-0124 we write:

---
Critical (CVSS = 9.0 – 10.0): 3 hours
High (CVSS = 7.0 – 8.9): 3 days
Mid (CVSS = 4.0 – 6.9): 1 month
Low (CVSS = 0.1 – 3.9): 3 months
---

Our Policies should be the same where possible, so adjust this to match IaaS.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr
Copy link
Copy Markdown
Member Author

fkr commented Feb 17, 2026

This was noticed by @janeczku and raised in our RKE2 session at the hackathon.

@mbuechse
Copy link
Copy Markdown
Contributor

mbuechse commented Feb 17, 2026

I agree that it may be beneficial to harmonize the two standards, but as far as I can tell, scs-0210 came first, and now I'm wondering why scs-0124 takes precedence.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr
Copy link
Copy Markdown
Member Author

fkr commented Feb 18, 2026

I agree that it may be beneficial to harmonize the two standards, but as far as I can tell, scs-0210 came first, and now I'm wondering why scs-0124 takes precedence.

It does not take precedence, but it actually explains the chosen scores much better. Why did we pick 8 for critical in this standard? Technicially only >= 9.0 is critical. High is 7.0 - 8.9 - the IaaS standard explains this and also points to the BSI C5 common criteria. I've updated the change to explain this better.

Thanks for highlighting this!

Copy link
Copy Markdown
Contributor

@mbuechse mbuechse left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we now include CVEs with scores 7 through 8, this makes the regulation stricter, but the rule in question is only a recommendation, so we should be good.

@fkr
Copy link
Copy Markdown
Member Author

fkr commented Feb 18, 2026

If we now include CVEs with scores 7 through 8, this makes the regulation stricter, but the rule in question is only a recommendation, so we should be good.

or we explain why we chose 8 - that was the question that initially started this discussion and why i looked up what we do for IaaS.

@depressiveRobot depressiveRobot changed the title streamline this with SCS-0124 streamline SCS-0210 with SCS-0124 Feb 18, 2026
@fkr fkr marked this pull request as draft February 18, 2026 10:06
Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@depressiveRobot depressiveRobot changed the title streamline SCS-0210 with SCS-0124 streamline CVE handling in SCS-0210 with SCS-0124 Feb 18, 2026
@depressiveRobot depressiveRobot added kaas-hackathon KaaS Issues or pull requests relevant to the SCS KaaS layer. labels Feb 18, 2026
@mbuechse
Copy link
Copy Markdown
Contributor

I think this has enough overlap with #1098 that we should link the two?

@fkr
Copy link
Copy Markdown
Member Author

fkr commented Feb 18, 2026

@depressiveRobot we also said in the session that we should likely introduce a v3

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr
Copy link
Copy Markdown
Member Author

fkr commented Feb 18, 2026

I've added a v3 and incorporated the suggestions from @depressiveRobot

fkr added a commit that referenced this pull request Feb 18, 2026
this was a suggestion from @depressiveRobot in #1099, since
we link the same document/passage here, adopt this.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
@fkr fkr mentioned this pull request Feb 18, 2026
mbuechse pushed a commit that referenced this pull request Feb 18, 2026
This was a suggestion from @depressiveRobot in #1099.
Since we link the same document/passage here, adopt this.

Signed-off-by: Felix Kronlage-Dammers <fkr@hazardous.org>
the provided Kubernetes versions should be kept up-to-date with new upstream releases:

- The latest minor version MUST be provided no later than 4 months after release.
- The latest patch version MUST be provided no later than 2 weeks after release.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

we wanted to drop this, didn't we? I don't see a point in having this for patches that don't contain important security fixes.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't manage to find concrete resources on Kubernetes patch releases on the hyperscalers. I think they say basically that they do it regularly, but don't give deadlines. I currently would say that we should maybe change it to 4 weeks instead of 2 weeks. This will ensure that providers regularly ship new versions, but also doesn't create too much pressure.

In case someone has a valid reason why 2 weeks are better, I'm totally fine to keep it. I have found to specific reason though why it would be mandatory.

cc @garloff

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We did some research again on this and concluded based on what e.g. BSI C5 says about CVE's with low importance, as well as what some big players say about it, that "less than one month" would be a good compromise. "Less than two weeks" seems extremely harsh looking at the proposed handling of CVE's in the industry and for compliance.

IMO we could open a PR to just change this. Currently "no later than 2 weeks" to then "no later than one month".

@mbuechse @fkr @depressiveRobot @garloff

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sounds good to me... Let me open the PR real quick. Also close this one according to the decision by SIG Std/Cert yesterday.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

See here: #1153

a new patch version in a 3-day time period after their release, this is in
accordance with the BSI C5:2020[^1].

- This time period MUST be even shorter for patches that fix critical or high CVEs.
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what does "must be even shorter" mean? Either let's write "must be 3 days" or something else shorter than 3 days.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this is a botched edit, compare w/version 2: https://docs.scs.community/standards/scs-0210-v2-k8s-version-policy#decision

There it makes sense, because the "even shorter" is just an introduction, and the concrete period is stated in a later sentence within the same bullet point.

Signed-off-by: Marvin Frommhold <depressiveRobot@users.noreply.github.com>
@mbuechse
Copy link
Copy Markdown
Contributor

Closing as decided by SIG Std/Cert yesterday.

@mbuechse mbuechse closed this Apr 10, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

KaaS Issues or pull requests relevant to the SCS KaaS layer. kaas-hackathon

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[Feature Request] Reduce kubernetes version policy for minor versions

4 participants