CVE-2022-41939 is is a client library and CLI enabling the development and deployment of Kubernetes functions. Developers using a malicious or compromised third-party buildpack could expose their registry credentials or local docker socket to a malicious `lifecycle` container. This issues has been patched in PR #1442, and is part of release 1.8.1. This issue only affects users who are using function buildpacks from third-parties; pinning the builder image to a specific content-hash with a valid `lifecycle` image will also mitigate the attack.

Configuration 1 (hide)



26 Nov 2022, 03:21

Type Values Removed Values Added
CPE cpe:2.3:a:cncf:knative_func:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.4
First Time Cncf
Cncf knative Func
References (MISC) - (MISC) - Patch, Third Party Advisory
References (CONFIRM) - (CONFIRM) - Exploit, Patch, Third Party Advisory
References (MISC) - (MISC) - Third Party Advisory
References (MISC) - (MISC) - Release Notes, Third Party Advisory

19 Nov 2022, 01:15

Type Values Removed Values Added


Published : 2022-11-19 01:15

Updated : 2022-11-26 03:21

NVD link : CVE-2022-41939

Mitre link : CVE-2022-41939

JSON object : View

Products Affected


  • knative_func

Exposure of Sensitive Information to an Unauthorized Actor