New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use latest oc binary to avoid known CVE issues #2416
Comments
Thanks, I think this also applies to our vendor client-go (occlient) library |
There are two CVEs. https://nvd.nist.gov/vuln/detail/CVE-2019-11253 https://bugzilla.redhat.com/show_bug.cgi?id=1753495 |
Interesting read regarding this issue https://www.stackrox.com/post/2019/09/beyond-patching-fixing-kubectl-cp-cve-2019-11251/ |
@kadel I don't see any changes which will be required in odo's tarring logic The resursiveTar() in the upstream has the same logic as ours. The changes were done in the unTarAll function but I couldn't find any usage of it in our code base. |
@kadel @cdrage @nickboldt Looking at kubernetes/kubernetes@786acdb, I could find that the changes were done in the unTarAll() function which is used in the copyFromPod() function https://github.com/kubernetes/kubernetes/blob/2fbe432d2347d7f808054f92f2b146e8a7dd2de8/pkg/kubectl/cmd/cp/cp.go#L324 Thus looking at the above code base, I think the vulnerability exists when the attacker places the malicious software in a pod and the victim copies files from the pod back to his source computer. Since we don't copy files from the pod to a user's computer, I don't think we affected by this issue. Also I couldn't find the usage of the unTarAll() logic anywhere in our code. So I guess we can close this issue. |
Well, you're still better off IMHO being based on newer versions of oc than 3.11.0 (as 3.11.156 is the latest) or moving to 4.2.latest... but it's good to now this specific CVE issue might not affect you. (There are others. Or there wouldn't haven been a need for 156 z-stream updates to 3.11.0 since Oct 2018.) |
@nickboldt Do you mean the OC binary or the client-go? We don't use the OC binary in our code base. As for the client-go, we have plans to update it to a newer version in a upcoming PR. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
closing this due to inactivity. |
I meant the oc binary. |
@nickboldt We don't use the OC binary anymore in ODO. We have moved to client-go long back. We even updated client-go to release-4.1 recently https://github.com/openshift/odo/blob/18f9f3b33404b5a2d5f662f9dd494128c41d093f/glide.yaml#L17 |
/kind enhancement
Which functionality do you think we should update/improve?
Update to newer oc binary to fix known CVE issues.
Why is this needed?
Known CVE issue: https://access.redhat.com/errata/RHSA-2019:3905
Fix: move to atomic-openshift-clients-3.11.154-1.git.0.7a097ad.el7.x86_64.rpm (or newer).
For example:
https://mirror.openshift.com/pub/openshift-v3/clients/ (3.11.156 currently latest)
Alternatively it might be worth considering moving to the oc 4.2 binary instead:
https://mirror.openshift.com/pub/openshift-v4/clients/ocp/ (4.2.8 currently latest)
The text was updated successfully, but these errors were encountered: