Skip to content

[SECURITY] Vulnerabilities reported by govulncheck for v5.6.0 #1405

@cmontemuino

Description

@cmontemuino

What did you do

git clone git@github.com:k3d-io/k3d.git && pushd k3d
git checkout v5.6.0
govulncheck ./...

What did you expect to happen

Found no vulnerabilities that could be fixed by upgrading dependencies.

Open PRs solving all of the reported vulnerabilities:

Screenshots or terminal output

govulncheck ./...
Scanning your code and 502 packages across 90 dependent modules for known vulnerabilities...

Vulnerability #1: GO-2023-2382
    Denial of service via chunk extensions in net/http
  More info: https://pkg.go.dev/vuln/GO-2023-2382
  Standard library
    Found in: net/http/internal@go1.21
    Fixed in: net/http/internal@go1.21.5
    Example traces found:
      #1: pkg/runtimes/docker/node.go:316:26: docker.Docker.ExecInNodeGetLogs calls io.ReadAll, which eventually calls internal.chunkedReader.Read

Vulnerability #2: GO-2023-2186
    Incorrect detection of reserved device names on Windows in path/filepath
  More info: https://pkg.go.dev/vuln/GO-2023-2186
  Standard library
    Found in: path/filepath@go1.21
    Fixed in: path/filepath@go1.21.4
    Example traces found:
      #1: pkg/runtimes/docker/util.go:105:61: docker.Docker.CopyToNode calls archive.PrepareArchiveCopy, which eventually calls filepath.IsLocal

Vulnerability #3: GO-2023-2185
    Insecure parsing of Windows paths with a \??\ prefix in path/filepath
  More info: https://pkg.go.dev/vuln/GO-2023-2185
  Standard library
    Found in: path/filepath@go1.21
    Fixed in: path/filepath@go1.21.4
    Platforms: windows
    Example traces found:
      #1: cmd/util/plugins.go:82:16: util.ExecPlugin calls exec.Cmd.Run, which eventually calls filepath.Abs
      #2: cmd/util/plugins.go:82:16: util.ExecPlugin calls exec.Cmd.Run, which eventually calls filepath.Abs
      #3: cmd/util/config/config.go:61:93: config.InitViperWithConfigFile calls filepath.Base
      #4: cmd/util/config/config.go:61:93: config.InitViperWithConfigFile calls filepath.Base
      #5: pkg/runtimes/docker/util.go:196:28: docker.GetDockerClient calls command.DockerCli.Initialize, which eventually calls filepath.Clean
      #6: pkg/runtimes/docker/util.go:196:28: docker.GetDockerClient calls command.DockerCli.Initialize, which eventually calls filepath.Clean
      #7: pkg/client/kubeconfig.go:82:39: client.KubeconfigGetWrite calls filepath.Dir
      #8: pkg/client/kubeconfig.go:82:39: client.KubeconfigGetWrite calls filepath.Dir
      #9: pkg/runtimes/docker/util.go:88:44: docker.Docker.CopyToNode calls archive.CopyInfoSourcePath, which eventually calls filepath.EvalSymlinks
      #10: pkg/runtimes/docker/util.go:88:44: docker.Docker.CopyToNode calls archive.CopyInfoSourcePath, which eventually calls filepath.EvalSymlinks
      #11: pkg/runtimes/docker/util.go:105:61: docker.Docker.CopyToNode calls archive.PrepareArchiveCopy, which eventually calls filepath.IsLocal
      #12: pkg/runtimes/docker/util.go:105:61: docker.Docker.CopyToNode calls archive.PrepareArchiveCopy, which eventually calls filepath.IsLocal
      #13: pkg/runtimes/docker/util.go:193:28: docker.GetDockerClient calls flags.ClientOptions.InstallFlags, which calls filepath.Join
      #14: pkg/runtimes/docker/util.go:193:28: docker.GetDockerClient calls flags.ClientOptions.InstallFlags, which calls filepath.Join
      #15: pkg/runtimes/docker/util.go:88:44: docker.Docker.CopyToNode calls archive.CopyInfoSourcePath, which eventually calls filepath.Split
      #16: pkg/runtimes/docker/util.go:88:44: docker.Docker.CopyToNode calls archive.CopyInfoSourcePath, which eventually calls filepath.Split
      #17: cmd/util/plugins.go:82:16: util.ExecPlugin calls exec.Cmd.Run, which eventually calls filepath.VolumeName
      #18: cmd/util/plugins.go:82:16: util.ExecPlugin calls exec.Cmd.Run, which eventually calls filepath.VolumeName
      #19: pkg/runtimes/docker/util.go:93:40: docker.Docker.CopyToNode calls archive.TarResource, which eventually calls filepath.WalkDir
      #20: pkg/runtimes/docker/util.go:93:40: docker.Docker.CopyToNode calls archive.TarResource, which eventually calls filepath.WalkDir

=== Informational ===

There are 8 vulnerabilities in modules that you require that are
neither imported nor called. You may not need to take any action.
See https://pkg.go.dev/golang.org/x/vuln/cmd/govulncheck for details.

Vulnerability #1: GO-2023-2412
    RAPL accessibility in github.com/containerd/containerd
  More info: https://pkg.go.dev/vuln/GO-2023-2412
  Module: github.com/containerd/containerd
    Found in: github.com/containerd/containerd@v1.7.3
    Fixed in: github.com/containerd/containerd@v1.7.11

Vulnerability #2: GO-2023-2402
    Man-in-the-middle attacker can compromise integrity of secure channel in
    golang.org/x/crypto
  More info: https://pkg.go.dev/vuln/GO-2023-2402
  Module: golang.org/x/crypto
    Found in: golang.org/x/crypto@v0.9.0
    Fixed in: golang.org/x/crypto@v0.17.0

Vulnerability #3: GO-2023-2102
    HTTP/2 rapid reset can cause excessive work in net/http
  More info: https://pkg.go.dev/vuln/GO-2023-2102
  Module: golang.org/x/net
    Found in: golang.org/x/net@v0.10.0
    Fixed in: golang.org/x/net@v0.17.0

  Standard library
    Found in: net/http@go1.21
    Fixed in: net/http@go1.21.3

Vulnerability #4: GO-2023-2045
    Memory exhaustion in QUIC connection handling in crypto/tls
  More info: https://pkg.go.dev/vuln/GO-2023-2045
  Standard library
    Found in: crypto/tls@go1.21
    Fixed in: crypto/tls@go1.21.1

Vulnerability #5: GO-2023-2044
    Panic when processing post-handshake message on QUIC connections in
    crypto/tls
  More info: https://pkg.go.dev/vuln/GO-2023-2044
  Standard library
    Found in: crypto/tls@go1.21
    Fixed in: crypto/tls@go1.21.1

Vulnerability #6: GO-2023-2043
    Improper handling of special tags within script contexts in html/template
  More info: https://pkg.go.dev/vuln/GO-2023-2043
  Standard library
    Found in: html/template@go1.21
    Fixed in: html/template@go1.21.1

Vulnerability #7: GO-2023-2041
    Improper handling of HTML-like comments in script contexts in html/template
  More info: https://pkg.go.dev/vuln/GO-2023-2041
  Standard library
    Found in: html/template@go1.21
    Fixed in: html/template@go1.21.1

Vulnerability #8: GO-2023-1988
    Improper rendering of text nodes in golang.org/x/net/html
  More info: https://pkg.go.dev/vuln/GO-2023-1988
  Module: golang.org/x/net
    Found in: golang.org/x/net@v0.10.0
    Fixed in: golang.org/x/net@v0.13.0

Your code is affected by 3 vulnerabilities from the Go standard library.

Share feedback at https://go.dev/s/govulncheck-feedback

Which OS & Architecture

N/A

Which version of k3d

v5.6.0

Which version of docker

N/A

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't working

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions