Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Vulnerability of dependency "github.com/opencontainers/runc" #548

Open
Silence-worker-02 opened this issue Jul 14, 2023 · 3 comments
Open

Comments

@Silence-worker-02
Copy link

Hello, we are a team researching the dependency management mechanism of Golang. During our analysis, we came across your project and noticed that it contains a vulnerability (CVE-2022-29162). In your project, the github.com/opencontainers/runc package is being used at version github.com/opencontainers/runc v1.0.2, but the patched version is v1.1.2. To fix the vulnerability, we recommend modifying the go.mod file to update the version to v1.1.2 or higher. Thank you for your attention to this matter.

@kcq
Copy link
Member

kcq commented Jul 15, 2023

Do you have an exploit or, at least, a sequence diagram for it that shows how that vulnerability can be triggered in slim?

@Silence-worker-02
Copy link
Author

Silence-worker-02 commented Jul 16, 2023

Thank you for reply. During our manual examination of the call graph, we found that 'github.com/opencontainers/runc' is imported by 'github.com/docker/docker', but the vulnerable function is not utilized in the latter. Nevertheless, to proactively mitigate potential future risks, we strongly recommend upgrading 'github.com/opencontainers/runc' to its patch version. This precautionary measure ensures that the vulnerability is addressed and reduces any potential security risks in the long term.

@kcq
Copy link
Member

kcq commented Jul 18, 2023

Fixing just in case isn't a great approach and it blurs the line between real vulnerabilities and software that's simply vulnerability adjacent. As an industry we need to focus on the real and exploitable vulnerabilities otherwise there'll be too much noise and vulnerability fatigue.

I do appreciate the report though! Thank you for opening the issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants