-
Notifications
You must be signed in to change notification settings - Fork 957
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Minimist not updated in release. CVE found #1886
Comments
Hi @lhaussknecht, |
Hi @lhaussknecht, This dependency is actually a dev dependency which is not used in the production. That means, even though an insecure package exists, it is not exploitable by any means. You can see it by running
This is still an issue that we want to fix for sure, and thank you for submitting it! This comment is just to explain that this is not exploitable. |
Thanks @nikola-jokic for the clarification. At the moment we use the runner inside of containers and our registry blocks pulls because of this critical CVE. |
@lhaussknecht Hey! Which registry are you using? Can you reconfigure it to ignore the minist dependency only for your runner images? (IMHO, vulnerability scanners can never be 100% correct in practice so I believe any serious vulnerability scanning solution should already have a way to fine-tune the scanning policy |
We are using Harbor. As far as I know it's only possible to put CVEs on a allow-list per project. So in our case that would allow a real minimist CVE in other images to be pulled. |
@nikola-jokic Just wanted to make clear, that we are talking about minimist and not minimatch. |
Hey @lhaussknecht, What I posted is just the poof that we are not using minimist in the production. I showed the output of the production dependency tree just to show that we are not using minimist. Not that we are using a correct version of minimatch |
The CVE here is being found in the node12 version we bundle with the runner. Node12 is no longer actively maintained, so we don't have a version we can update to to fix this. We are in the process of deprecating node 12, after which we will remove that binary from the runner, but that likely won't happen in the next month. I've filed an issue in the meantime to allow runner admins to force the node16 binary to be used. As a part of your docker build process, you should be able to delete the node 12 folder and enable that env to work around your issue. I'll update this issue when that feature is ready. |
For now we build our own image and just removed everything from the base image:
|
Hi @thboop and team
the above is currently blocking our release, is there a plan to upgrade or a workaround we can use in the meantime? (for reference, both |
Hi, there. |
|
Describe the bug
The runner contains an unfixed CVE, that I reported here: actions/actions-runner-controller#1413
It looks like Minimist was updated in 0343e76, but the current release contains an old version (1.2.5) that contains a critical CVE.
To Reproduce
Steps to reproduce the behavior:
Expected behavior
Minimist 1.2.6 without a CVE should be packaged in the release.
Runner Version and Platform
v2.291.1
What's not working?
The runner cannot be run because it contains a critical CVE.
Job Log Output
Runner and Worker's Diagnostic Logs
The text was updated successfully, but these errors were encountered: