Skip to content

fix(deps): upgrade github.com/docker/cli to v29.2.0 for CVE fix#710

Merged
michaeljguarino merged 1 commit intomainfrom
agent/fix-docker-cli-cve-1741206568423
Mar 5, 2026
Merged

fix(deps): upgrade github.com/docker/cli to v29.2.0 for CVE fix#710
michaeljguarino merged 1 commit intomainfrom
agent/fix-docker-cli-cve-1741206568423

Conversation

@plural-copilot
Copy link
Copy Markdown
Contributor

@plural-copilot plural-copilot Bot commented Mar 5, 2026

Summary

  • Upgrades github.com/docker/cli from v28.1.1+incompatible to v29.2.0+incompatible
  • Fixes CVE: Docker CLI Plugins Uncontrolled Search Path Element vulnerability leading to Local Privilege Escalation on Windows
  • Addresses vulnerability in docker image ghcr.io/pluralsh/console:sha-0c07f81

Changes

  • Updated go.mod with new docker/cli version
  • Updated go.sum with corresponding checksums

Testing

  • Docker build completed successfully, confirming code compiles with upgraded dependency

Security Advisory

Docker CLI for Windows versions through 29.1.5 search for plugin binaries in C:\ProgramData\Docker\cli-plugins, a directory that does not exist by default. A low-privileged attacker can create this directory and place malicious CLI plugin binaries that are executed when a victim user opens Docker Desktop or invokes Docker CLI plugin features, potentially allowing privilege escalation if the docker CLI is executed as a privileged user.

This issue does not impact non-Windows binaries and projects not using the plugin-manager code.

Upgrades github.com/docker/cli from v28.1.1+incompatible to v29.2.0+incompatible
to address CVE: Docker CLI Plugins Uncontrolled Search Path Element vulnerability
that leads to Local Privilege Escalation on Windows.

This fix addresses the vulnerability in docker image ghcr.io/pluralsh/console:sha-0c07f81.
Copy link
Copy Markdown
Contributor Author

@plural-copilot plural-copilot Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This PR was generated by the claude (engine: claude) agent runtime. Here's some useful information you might want to know to evaluate
the ai's perfomance:

Name Details
💬 Prompt Security scanners have found the following vulnerability in our cluster:...
🔗 Run history View run history

@michaeljguarino michaeljguarino added the enhancement New feature or request label Mar 5, 2026
@michaeljguarino michaeljguarino merged commit 64608a7 into main Mar 5, 2026
14 of 15 checks passed
@michaeljguarino michaeljguarino deleted the agent/fix-docker-cli-cve-1741206568423 branch March 5, 2026 21:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant