Closed
Description
Here are some scan results from Trivy:
root/.local/share/helm/plugins/helm-diff/bin/diff (gobinary)
============================================================
Total: 7 (UNKNOWN: 2, LOW: 0, MEDIUM: 1, HIGH: 4, CRITICAL: 0)
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| github.com/containerd/containerd | CVE-2021-41103 | HIGH | v1.4.4 | v1.4.11, v1.5.7 | containerd: insufficiently |
| | | | | | restricted permissions on container |
| | | | | | root and plugin directories |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-41103 |
+ +------------------+----------+ +-----------------------------------------+---------------------------------------+
| | CVE-2021-32760 | MEDIUM | | v1.4.8, v1.5.4 | containerd: pulling and |
| | | | | | extracting crafted container |
| | | | | | image may result in Unix file... |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-32760 |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| github.com/docker/cli | CVE-2021-41092 | HIGH | v20.10.5+incompatible | v20.10.9 | docker: cli leaks private registry |
| | | | | | credentials to registry-1.docker.io |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-41092 |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| github.com/opencontainers/image-spec | GMS-2021-101 | UNKNOWN | v1.0.1 | 1.0.2 | Clarify `mediaType` handling |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| github.com/opencontainers/runc | CVE-2019-16884 | HIGH | v0.1.1 | 1.0.0-rc8.0.20190930145003-cad42f6e0932 | runc: AppArmor/SELinux bypass |
| | | | | | with malicious image that |
| | | | | | specifies a volume at /proc... |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-16884 |
+ +------------------+ + +-----------------------------------------+---------------------------------------+
| | CVE-2019-19921 | | | 1.0.0-rc9.0.20200122160610-2fc03cc11c77 | runc: volume mount race condition |
| | | | | | with shared mounts leads to |
| | | | | | information leak/integrity... |
| | | | | | -->avd.aquasec.com/nvd/cve-2019-19921 |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
| golang.org/x/text | CVE-2021-38561 | UNKNOWN | v0.3.4 | 0.3.7 | -->avd.aquasec.com/nvd/cve-2021-38561 |
+--------------------------------------+------------------+----------+-----------------------+-----------------------------------------+---------------------------------------+
Metadata
Metadata
Assignees
Labels
No labels