-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2016-2781 | coreutils (CWE-20) #894
Comments
The issue has been closed by Kondukto since it is marked as won't fix. |
The issue has been reopened by Kondukto since its won't fix status has been removed. |
test |
noonono |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A low severity vulnerability has been discovered in your project.
Project Name: Node
Scanner Name: trivy
Cwe ID: 20
Cwe Name: Improper Input Validation
Cwe Link: https://cwe.mitre.org/data/definitions/20.html
CVE ID: CVE-2016-2781
Target: redis:latest (debian 11.3)
Packages:
References:
Tool Description: chroot in GNU coreutils, when used with --userspec, allows local users to escape to the parent session via a crafted TIOCSTI ioctl call, which pushes characters to the terminal's input buffer.
Custom Description: bbb
The text was updated successfully, but these errors were encountered: