Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Library with high vulnerability #1231

Closed
lugogregory opened this issue Oct 22, 2024 · 1 comment
Closed

Library with high vulnerability #1231

lugogregory opened this issue Oct 22, 2024 · 1 comment

Comments

@lugogregory
Copy link

I am using its most updated version v-4.0.29, and performing a quality test with Kiuwan, a library with high vulnerability has been detected. It is the library: [email protected], which is a dependency of another library: [email protected]. The vulnerability error it flags is the following:

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe

I propose to carry out a test on these libraries and, as far as possible, update them to avoid high vulnerabilities.

image

@mdonnalley
Copy link
Contributor

there's nothing we can do about this until sindresorhus/is-docker#16 is resovled

We have dependabot configured on this repo so we'll pick up the fix as soon as it's released

@mdonnalley mdonnalley closed this as not planned Won't fix, can't repro, duplicate, stale Oct 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants