Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update step-security/harden-runner digest to 7120a7a #592

Merged
merged 1 commit into from
Jun 20, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 20, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
step-security/harden-runner action digest 215c5ca -> 7120a7a

⚠ Dependency Lookup Warnings ⚠

Warnings were logged while processing this repo. Please check the Dependency Dashboard for more information.


Configuration

📅 Schedule: Branch creation - "after 8pm every weekday,before 10am every weekday,every weekend" in timezone America/Chicago, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot added the renovate label Jun 20, 2023
@github-actions
Copy link

Testing script results from test/test.sh
✅ Test result: passes

Test script outputs from test/test.sh

  • set -C
  • SARIF_FILE=./test/fixtures/odc.sarif
  • TOKEN=fake-password
  • REPOSITORY=sett-and-hive/sarif-to-issue-action
  • BRANCH=fake-test-branch
  • TITLE='Test security issue from build'
  • LABELS=build
  • DRY_RUN=true
  • ODC_SARIF=true
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $1}'
  • OWNER=sett-and-hive
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $2}'
  • REPO=sarif-to-issue-action
  • '[' true == true ']'
  • fix_odc_sarif
  • ord_sarif=./test/fixtures/odc.sarif
  • mod_sarif=./test/fixtures/odc.sarif.mod
  • rm -f ./test/fixtures/odc.sarif.mod
  • jq '.runs[].tool.driver.rules[] |= . + {"defaultConfiguration": { "level": "error"}}' ./test/fixtures/odc.sarif
    Convert SARIF file ./test/fixtures/odc.sarif
  • SARIF_FILE=./test/fixtures/odc.sarif.mod
  • echo 'Convert SARIF file ./test/fixtures/odc.sarif'
  • npx @security-alert/sarif-to-issue --dryRun true --token fake-password --owner sett-and-hive --sarifContentOwner sett-and-hive --repo sarif-to-issue-action --sarifContentRepo sarif-to-issue-action --sarifContentBranch fake-test-branch --title 'Test security issue from build' --labels build ./test/fixtures/odc.sarif.mod
    Create Issue
    owner: sett-and-hive
    repo: sarif-to-issue-action
    labels: build
    assignees:
    title: Test security issue from build
    body: # Report

Results

  • [ERROR] [CVE-2022-24823] CVE-2022-24823 - Netty is an open-source, asynchronous event-driven network application framework. The package io.netty:netty-codec-httpprior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's ownjava.io.tmpdir when starting the JVM or use DefaultHttpDataFactory.setBaseDir\(...\) to set the directory to something that is only readable by the current user.

Suppressed Results

Nothing here.

Rules information

Rules details
- CVE-2022-24823 [undefined] 

> Medium severity - CVE-2022-24823 Exposure of Resource to Wrong Sphere vulnerability in pkg:maven/io.netty/[email protected]

Tool information

  • Name: dependency-check
  • Organization: undefined
  • Version: undefined

::set-output name=output::0

  • echo '::set-output name=output::0'

@renovate renovate bot merged commit 704408e into main Jun 20, 2023
4 checks passed
@renovate renovate bot deleted the renovate/step-security-harden-runner-digest branch June 20, 2023 02:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants