Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Library with high vulnerability #16

Closed
lugogregory opened this issue Oct 22, 2024 · 3 comments
Closed

Library with high vulnerability #16

lugogregory opened this issue Oct 22, 2024 · 3 comments

Comments

@lugogregory
Copy link

I am using its most updated version v-3.0.0, as a third-party dependency in my project, and performing a quality test with Kiuwan, a high vulnerability has been detected. The vulnerability error it indicates is the following:

runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe.

image

@sindresorhus
Copy link
Owner

None of those vulnerabilities seem related to is-docker.

@sindresorhus sindresorhus closed this as not planned Won't fix, can't repro, duplicate, stale Oct 22, 2024
@lugogregory
Copy link
Author

Hi @sindresorhus, the last vulnerability is related with is-docker-3.0.0:

"runc through 1.0-rc6, as used in Docker before 18.09.2 and other products, allows attackers to overwrite the host runc binary (and consequently obtain host root access) by leveraging the ability to execute a command as root within one of these types of containers: (1) a new container with an attacker-controlled image, or (2) an existing container, to which the attacker previously had write access, that can be attached with docker exec. This occurs because of file-descriptor mishandling, related to /proc/self/exe."

image

@sindresorhus
Copy link
Owner

That is a vulnerability in Docker, but I still don't see how it's a vulnerability in this package.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants