Upgrade containernetworking/cni dependency #346
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
While working with Device Plugin SNYK scan reported vulnerability in containernetworking/cni module, therefore decided to update the module.
Vulnerability's details below:
HIGH SEVERITY
Directory Traversal
Vulnerable module: github.com/containernetworking/cni/pkg/invoke
Introduced through: github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils@#9d213757d22d
Exploit maturity: No known exploit
Fixed in: 0.8.1
Detailed paths
Introduced through: github.com/k8snetworkplumbingwg/sriov-network-device-plugin@0.0.0 › github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils@#9d213757d22d › github.com/containernetworking/cni/libcni@0.8.0 › github.com/containernetworking/cni/pkg/invoke@0.8.0
Overview
Affected versions of this package are vulnerable to Directory Traversal. When specifying the plugin to load in the type field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. An attacker can use this to execute other existing binaries other than the cni plugins/types such as reboot.