The Anaconda team tracks security vulnerabilities and CVEs via the National Vulnerability Database (NVD) on an ongoing basis. Our team is committed to the security of Anaconda Enterprise by making updates available in a timely manner in response to security vulnerabilities and similar incidents. Two security vulnerabilities (CVE-2017-1002101 and CVE-2017-1002102) were recently identified in Kubernetes, which is used as container orchestration infrastructure for notebook sessions and deployments in Anaconda Enterprise.
These security vulnerabilities allow containers using subpath volume mounts, secrets, configMaps, and projected or downwardAPI volumes to access or delete arbitrary files and folders on the host filesystem.
Additional details regarding the vulnerabilities are provided in the following Common Vulnerabilities and Exposures (CVEs) reports and development issues:
- CVE-2017-1002101 – Subpath volume mount handling allows arbitrary file access in host filesystem
- CVE-2017-1002102 – Atomic writer volume handling allows arbitrary file deletion in host filesystem
Who is impacted:
These security vulnerabilities impact all customers using Anaconda Enterprise 5.1.1 and earlier, which use affected versions of Kubernetes.
Action required:
An updated version of Anaconda Enterprise 5.1.2 will be made available on March 16, 2018, resolving CVE-2017-1002101 and CVE-2017-1002102. An in-place upgrade to Anaconda Enterprise 5.1.2 can be performed by following the documented upgrade instructions.
Talk to an Expert
Talk to one of our experts to find solutions for your AI journey.