This repository provides Vulnerability Exploitability eXchange (VEX) reports for Tigera's Calico, Calico Enterprise, and Calico Cloud product images. The VEX reports in this repository are intended to provide insights and vendor comments for CVEs that may appear in vulnerability scans of Tigera's product images. The VEX reports are generated at the time of official release for each product version, and are in OpenVEX format.
Note: Reports include only official CVEs IDs and Github GHSA IDs, and do not include private source/third-party identifiers.
Note: This repository is not intended for CVE submissions. For CVEs inquires, please refer to Tigera's Vulnerability Disclosure Policy.
Users can refer to these VEX reports to understand the analysis and mitigations applied to CVEs identified in Tigera products. The reports provides exploitability status and impact statement for known CVEs. Users can import the reports to provide additional context or filter the CVEs that do not affect Tigera products.
While scanner behavior may vary over time, VEX is currently supported by scanners such as Trivy and Grype as shown below. For the most up-to-date instructions or compatibility with other scanners, please refer to the official documentation of each tool.
Note: VEX is a new feature and scanners may change their behavior in the future. As part of generating each VEX report, each report is verified by the latest version of Trivy and Grype to make sure it is compatible with the scanners at the time of release.
trivy image [your-image] --vex [path-to-VEX-document]
grype image [your-image] --vex [path-to-VEX-document]
Note: Grype may require additional configuration to suppress the display of vulnerabilities that are marked as "not affected" in the VEX document. Make sure your
grype.yaml
configuration file is updated accordingly.
Each report includes a signature for the VEX document, which is digitally signed using cosign. As an optional security measure, you can verify the authenticity of each report before importing it into your scanner.
-
Install cosign
Follow the instructions in the cosign GitHub repository. -
Run the verification command
Use the following command to verify a signed VEX document:cosign verify-blob --key [path-to-Tigera-VEX-public-key] --signature [path-to-signature] [path-to-VEX-document]
Note: You can find the Tigera public key, VEX documents, and their corresponding signatures in this repository.