Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade containernetworking/cni dependency #346

Merged

Conversation

ipatrykx
Copy link
Contributor

While working with Device Plugin SNYK scan reported vulnerability in containernetworking/cni module, therefore decided to update the module.

Vulnerability's details below:

HIGH SEVERITY
Directory Traversal

Vulnerable module: github.com/containernetworking/cni/pkg/invoke
Introduced through: github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils@#9d213757d22d
Exploit maturity: No known exploit
Fixed in: 0.8.1

Detailed paths
Introduced through: github.com/k8snetworkplumbingwg/sriov-network-device-plugin@0.0.0 › github.com/k8snetworkplumbingwg/network-attachment-definition-client/pkg/utils@#9d213757d22d › github.com/containernetworking/cni/libcni@0.8.0 › github.com/containernetworking/cni/pkg/invoke@0.8.0

Overview
Affected versions of this package are vulnerable to Directory Traversal. When specifying the plugin to load in the type field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. An attacker can use this to execute other existing binaries other than the cni plugins/types such as reboot.

@martinkennelly martinkennelly merged commit 33c8552 into k8snetworkplumbingwg:master Apr 26, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants