-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Vulnerabilities in Dependencies: cross-spawn 7.0.3 and braces < 3.0.3 #3741
Comments
I am currently woking on bumping the version to the stable and latest version |
I've submitted a fix for these vulnerabilities in PR#3743, which updates both cross-spawn to v7.0.6 and braces to v3.0.3. |
Hello @MayorFaj , I am also getting an additional Dependency error, would you like me to Open an issue for this one as well? |
@Blizter the vulns are in the dependencies of the docker-buildx version used in the docker image. |
Package-Path: /actions-runner/externals/node20/lib/node_modules/cross-spawn/package.json |
Security Vulnerabilities in Dependencies: cross-spawn 7.0.3 and braces < 3.0.3
Describe the bug
The GitHub Actions runner (v2.322.0) contains two high-severity dependencies with known security vulnerabilities:
These vulnerabilities are being detected by image scanners and causing security scans to fail in our CI/CD pipelines.
To Reproduce
Expected behavior
The dependencies should be updated to their fixed versions:
Runner Version and Platform
What's not working?
Security scans are failing due to these high-severity vulnerabilities, causing our deployment pipelines to halt at security gates. Our organization's security policy requires remediating high-severity vulnerabilities before deployment.
Vulnerability Details
cross-spawn (CVE-2024-21538):
Versions before 7.0.5 are vulnerable to Regular Expression Denial of Service due to improper input sanitization. An attacker can increase CPU usage and crash the program by crafting a large, well-crafted string.
References:
braces (CVE-2024-4068):
Versions prior to 3.0.3 fail to limit the number of characters it can handle, leading to Memory Exhaustion. If a malicious user sends "imbalanced braces" as input, the parsing enters a loop that allocates heap memory without freeing it, eventually causing the program to crash.
References:
The text was updated successfully, but these errors were encountered: