-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remote code execution vulnerability in dependency System.Drawing.Common #6226
Comments
Weird, we haven't been getting dependabot alerts for any of these. I wonder if we're running into issues with the max number of outstanding PRs for it. |
#6226 <-- ran into this issue here.
Yep, that was it: #6227 |
Once that's pulled in we should get some CI updates for this. I agree that it'd be a good idea for us to add either CodeQL or some other security scanning service - discussed this over the summer with one of our customers who works in the space. |
#6226 <-- ran into this issue here.
* Upgrade to System.Configuration.ConfigurationManager 6.0.1 close #6226 * removed second dependency on System.Configuration.ConfigurationManager * fixed references
FYI, following the resolution of this issue we've added CodeQL vulnerability scanning to all PRs going forward #6254 |
Version Information
Version of Akka.NET? 1.4.45 and probably goes back a long way. v1.5 branch also seems affected.
Which Akka.NET Modules? The core Akka module.
Describe the bug
The core module depends on an old System.Configuration.ConfigurationManager version 4.7.0 which transitively depends on System.Common.Drawing v4.7.0. The System.Common.Drawing v4.7.0 is affected by a remote code execution vulnerability GHSA-ghhp-997w-qr28.
To Reproduce
Steps to reproduce the behavior:
akka.net\src\core\Akka>dotnet list package --vulnerable --include-transitive
Expected behavior
No critical vulnerabilities should be found.
Actual behavior
I get the following vulnerabilities (with
dev
branch on 2022-11-04, commit cebc498):Additional context
The fix should be pretty easy, just upgrade the vulnerable dependencies to more recent versions.
I think it would be nice to check for the vulnerable packages in the CI jobs for Akka with something like:
The
Newtonsoft.Json
dependency is also rather old (from 2019) and has a vulnerability, so should probably also be updated.The text was updated successfully, but these errors were encountered: