-
Notifications
You must be signed in to change notification settings - Fork 602
[Low] Patch kubernetes for CVE-2024-45310 #13294
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Low] Patch kubernetes for CVE-2024-45310 #13294
Conversation
Signed-off-by: Sreenivasulu Malavathula <v-smalavathu@microsoft.com>
| +// but properly handling the case where path or root are "/". | ||
| +// | ||
| +// NOTE: The return value only make sense if the path doesn't contain "..". | ||
| +func IsLexicallyInRoot(root, path string) bool { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this function called from somewhere? It doesn't look like to be fixing anything.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree. missing some parts of code.
Working on it.
Realized after PR generated,
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated the Patch file.
-Thanks
|
Three files are affected where as you have added patch for a single file |
Working on it. |
Update the Patch file. |
Kanishk-Bansal
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@Ankita13-code
need your inputs in this CVE
|
The runc version we are using (1.2.2) is not affected since this vulnerability exists for only <=1.1.13, <=1.2.0-rc.2 Hence, we are not vulnerable to this CVE Hence closing this PR |
|
Ankita, |
Merge Checklist
All boxes should be checked before merging the PR (just tick any boxes which don't apply to this PR)
*-staticsubpackages, etc.) have had theirReleasetag incremented../cgmanifest.json,./toolkit/scripts/toolchain/cgmanifest.json,.github/workflows/cgmanifest.json)./LICENSES-AND-NOTICES/SPECS/data/licenses.json,./LICENSES-AND-NOTICES/SPECS/LICENSES-MAP.md,./LICENSES-AND-NOTICES/SPECS/LICENSE-EXCEPTIONS.PHOTON)*.signatures.jsonfilessudo make go-tidy-allandsudo make go-test-coveragepassSummary
kubernetes: Patch for CVE-2024-45310
Change Log
Does this affect the toolchain?
NO
Associated issues
Links to CVEs
Test Methodology