Skip to content

Exclude docker/docker plugin and AuthZ vulns from govulncheck#4522

Closed
JAORMX wants to merge 1 commit intomainfrom
jaosorior/skip-docker-vulns
Closed

Exclude docker/docker plugin and AuthZ vulns from govulncheck#4522
JAORMX wants to merge 1 commit intomainfrom
jaosorior/skip-docker-vulns

Conversation

@JAORMX
Copy link
Copy Markdown
Collaborator

@JAORMX JAORMX commented Apr 3, 2026

Summary

Two new Docker Engine vulnerabilities (published 2026-04-02) are failing the govulncheck CI check across all PRs. Neither is exploitable in ToolHive because we are a pure Docker API client, but no patched release exists for the github.com/docker/docker v28.x module path we consume.

  • GO-2026-4883 (CVE-2026-33997, CVSS 6.8): Off-by-one error in Docker Engine's plugin privilege validation during docker plugin install. ToolHive never installs, enables, or manages Docker plugins -- zero plugin-related API calls exist in the codebase.
  • GO-2026-4887 (CVE-2026-34040, CVSS 8.8): AuthZ plugin bypass via oversized request bodies (incomplete fix for CVE-2024-41110). Exploitable only when the Docker daemon is configured with AuthZ plugins and an attacker has local API access. ToolHive does not run a Docker daemon, does not expose Docker API endpoints, and does not implement AuthZ plugin middleware.

Both are fixed in Docker Engine 29.3.1 / moby/moby/v2 v2.0.0-beta.8, but the github.com/docker/docker module (all v28.x) has no patched release. Added to the govulncheck exclusion list with detailed justification comments.

Type of change

  • Other (describe): CI govulncheck exclusion for non-applicable vulnerabilities

Test plan

  • Manual testing (describe below)

Verified the exclusion list format matches the existing pattern and that the govulncheck step's jq/grep pipeline will correctly filter these IDs.

Does this introduce a user-facing change?

No.

Generated with Claude Code

GO-2026-4883 (CVE-2026-33997, CVSS 6.8) and GO-2026-4887
(CVE-2026-34040, CVSS 8.8) affect Docker Engine's plugin privilege
validation and AuthZ plugin middleware respectively. Neither is
exploitable in ToolHive because we are a pure Docker API client: we
never install or manage plugins, never run a Docker daemon, and never
expose Docker API endpoints. Both are fixed in Docker Engine 29.3.1
but no patched release exists for the github.com/docker/docker v28.x
module path we consume.

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
@github-actions github-actions bot added the size/XS Extra small PR: < 100 lines changed label Apr 3, 2026
@ChrisJBurns
Copy link
Copy Markdown
Collaborator

Has been fixed #4521 ... beat ya to it!!!

@JAORMX JAORMX closed this Apr 3, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size/XS Extra small PR: < 100 lines changed

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants