-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Critical CVE-2021-44906 in minimist in image summerwind/actions-runner #1413
Comments
Perhaps it's a part of nodejs dependencies that actions/runner needs to run node-based actions? 🤔 |
Yes. It is a dependency of the runner. It was fixed in actions/runner#1783. But it seems, that the old version is included in the runner release. |
Thanks. actions/runner@0343e76 says it should be included since v2.290.0. What was the tag of our runner image on which you ran trivy? If it was tagged v0.290.0 or greater, can it be a bug in actions/runner's release process that the release archive contains outdated dependencies? 🤔 |
Yes. The current release downloads have Minimist in The package.json there is pointing to Will open a ticket there. |
Could the issue I'm seeing be related to the CVE?
I'm not sure I understand the last line? Should we simply upgrade to the latest Runner version? |
@BeyondEvil Hey! Not at all. It's saying what the error message tells- you're using an outdated version of |
Is it common practice to deprecate runners that are only ~2 months old? That's why I wondered if it was related to the CVE. I looked and looked, and I couldn't find any information about the deprecation. |
@BeyondEvil You might better ask It's a single release channel(there's no alpha, beta, stable release channels like linux distros for |
@BeyondEvil The runner updates itself automatically. If you disable this automatic update, you must update manually. If you do not update your runners within 30 days, they will stop receiving jobs. There's more information in the documentation. |
I see @ethomson, thanks for making that clear(er). I do have one question tho, if I understand correctly, it's not the Would a consequence of not updating the summerwind image, be that the runner will be updated on every invocation of an ephemeral runner? |
Correct. Once the runner is out of date it will update itself before any job is run. It will add unnecessary network ingress and a delay in starting every job. |
So what's best practice here considering we're using ephemeral runners? 😅 |
Keep your runner images current. I mean it's not so much best practice as enforced by GitHub. Much of the Actions logic to support a new feature is in the actions/runner software and so it needs to be current to support new features, that's why they enforce people updating with a short 30 day grace period. We automatically build a new image if actions/runner produce a new release so you either need to:
The main point I'm driving at here is ARC can't really help here, there is some automation required in your environment. We've got reports the self-update process can result in large delays in job allocation #1387 and so disabling the update is probably best, I also have some reports from ex-employers of this too. Additionally, it breaks the immutable concept that a container is supposed to provide so it's not ideal to begin with. The downside of turning self-updates off though is you'll need to implement some automation. |
Even using the
Yeah, totally get that. But I figured you of anyone probably have some ideas of how to deal with it. 😊
Yeah, it was partly due to this we turned it off. |
Yup, it's probably easier to reference an immutable tag and automate bumping it but it's all quite environment specific, people deploy and manage runners is lots and ways |
Thanks, this was really helpful! I now have a path forward. 🙇 With a little luck I can trigger a workflow based on new releases in the actions/runner repo. |
@BeyondEvil. if you do end up getting something together, sharing what you can as a show and tell in discussions is always welcomed! This is going to be an extremely common problem to tackle so I'm sure the community will appreciate some examples of some working solutions out there! |
This issue is stale because it has been open 30 days with no activity. Remove stale label or comment or this will be closed in 5 days. |
Trivy reports a critical CVE CVE-2021-44906 in a minimist dependency. I would love to create a PR but have no idea, where this is comming from...
The image sha, that was tested is: sha256:0580b846ff609f9bd6092eb173b8d0d967848e1ea349937bf4a441ce773b0f46
The text was updated successfully, but these errors were encountered: