Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Updating docker dependency version to https://github.com/google/cadvisor:v28.0.2+incompatible(latest) to fix security vuln #3676

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

pbettadapura
Copy link

We found vulnerabilities in Go Docker module v26.1.4:

cadvisor/cmd/go.mod

Line 67 in f6e31a3

github.com/docker/docker v26.1.4+incompatible // indirect
More details:
GO (Go) Security Update for github.com/docker/docker (GHSA-v23v-6jw2-98fq)

A security vulnerability has been detected in certain versions of Docker Engine, which could allow an attacker to bypass authorization plugins (AuthZ) under specific circumstances. The base likelihood of this being exploited is low. This advisory outlines the issue, identifies the affected versions, and provides remediation steps for impacted users.

Refer to Github security advisory [https://github.com/advisories/https://github.com/advisories/GHSA-v23v-6jw2-98fq] GHSA-v23v-6jw2-98fq for updates and patch information. Patch: Following are links for downloading patches to fix the vulnerabilities: [https://github.com/advisories/https://github.com/advisories/GHSA-v23v-6jw2-98fq] https://github.com/advisories/GHSA-v23v-6jw2-98fq:github.com/docker/docker

Fix for this vuln is to update github.com/docker/docker v26.1.4 to at least v26.1.5](GHSA-v23v-6jw2-98fq).

@pbettadapura
Copy link
Author

@dims @iwankgb Could you please help review this ?

@iwankgb
Copy link
Collaborator

iwankgb commented Apr 5, 2025

Is cAdvisor using this authorization code? I would rather say that it is server side of Docker, that makes use of them.

@pbettadapura
Copy link
Author

pbettadapura commented Apr 7, 2025

Is cAdvisor using this authorization code? I would rather say that it is server side of Docker, that makes use of them.

@iwankgb In my opinion, we still need to update the dependency package version because the vulnerability exists in the binaries ? Please let me know your thoughts.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants