First published: Sat Nov 19 2022(Updated: )
knative.dev/func is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious `lifecycle` container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid `lifecycle` image will also mitigate the attack.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Knative Func | <1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41939 is classified as a high severity vulnerability due to the potential exposure of sensitive credentials.
To mitigate CVE-2022-41939, upgrade to Knative Func version 1.8.1 or later.
CVE-2022-41939 affects the Knative Func client library and CLI, specifically versions prior to 1.8.1.
CVE-2022-41939 introduces the risk of exposing registry credentials or a local Docker socket to malicious containers.
Developers using a malicious or compromised third-party buildpack with Knative Func are significantly impacted by CVE-2022-41939.