Security: Fix CVE-2026-40938 - tektoncd/pipeline git resolver argument injection#3381
Merged
tekton-robot merged 1 commit intorelease-v0.78.xfrom Apr 30, 2026
Conversation
…jection - Upgrade github.com/tektoncd/pipeline v1.6.1 → v1.6.2 - Fixes GHSA-94jr-7pqp-xhcq: git resolver unsanitized revision parameter enables argument injection into git CLI, enabling RCE on resolver pod - Also fixes GHSA-wjxp-xrpv-xpff (CVE-2026-40161): git resolver API mode token leak via user-controlled serverURL - Also fixes GHSA-rx35-6rhx-7858 (CVE-2026-40923): VolumeMount path restriction bypass via missing filepath normalization - Also fixes GHSA-rmx9-2pp3-xhcr (CVE-2026-25542): VerificationPolicy regex pattern bypass via substring matching - Also fixes GHSA-m2cx-gpqf-qf74 (CVE-2026-40924): HTTP resolver OOM DoS Resolves: SRVKP-11752 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
Member
Author
|
/approve |
Contributor
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jkhelil The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Member
Author
|
/lgtm |
Contributor
|
@jkhelil: you cannot LGTM your own PR. DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Contributor
|
/lgtm |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
This PR fixes CVE-2026-40938 by upgrading
github.com/tektoncd/pipelinefrom v1.6.1 to v1.6.2.CVE Details
Additional CVEs Fixed in v1.6.2
This upgrade also resolves the following security issues:
serverURLfilepath.CleannormalizationChanges
5 files changed, 12 insertions(+), 9 deletions(-)
Test Results
Status:⚠️ TIMEOUT (no failures)
Tests discovered: Yes
Test command:
go test ./...Exit code: 124 (timeout — same behavior as previous automation runs on this repo)
Duration: 5m (timeout limit)
Packages passed:
pkg/apis/operator/v1alpha1pkg/commonpkg/reconciler/commonpkg/reconciler/common/tektoninstallersetpkg/reconciler/kubernetes/tektonchainpkg/reconciler/kubernetes/tektonconfig/extensionpkg/reconciler/kubernetes/tektondashboardpkg/reconciler/kubernetes/tektoninstallersetThe timeout is expected — this repo has long-running integration tests requiring a live cluster. All unit tests that completed passed with 0 failures. Full test coverage will be provided by CI after this PR.
Breaking Changes
None. This is a patch-level upgrade within the v1.6.x minor line. The only API changes are:
filepath.Clean()applied to VolumeMount paths before the/tekton/prefix check (CVE-2026-40923 fix) — this is a security hardening change that rejects previously-invalid paths like/tekton/../sensitiveVerification Steps
github.com/tektoncd/pipelineis at v1.6.2 ingo.modgo mod verifyto confirm checksumsgovulncheck -show verbose ./...should not report CVE-2026-40938Risk Assessment
🤖 Generated by CVE Fixer Workflow | Resolves: SRVKP-11752
Release Notes