Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update Node.js to c47d5e7 #1158

Merged
merged 1 commit into from
Feb 25, 2025
Merged

Update Node.js to c47d5e7 #1158

merged 1 commit into from
Feb 25, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 25, 2025

This PR contains the following updates:

Package Type Update Change
node final digest 7ed5bbd -> c47d5e7

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Configuration

📅 Schedule: Branch creation - "after 8pm every weekday,before 10am every weekday,every weekend" in timezone America/Chicago, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the renovate label Feb 25, 2025
Copy link

Testing script results from test/test.sh
✅ Test result: passes

Test script outputs from test/test.sh

  • set -C
  • SARIF_FILE=./test/fixtures/odc.sarif
  • TOKEN=fake-password
  • REPOSITORY=sett-and-hive/sarif-to-issue-action
  • BRANCH=fake-test-branch
  • TITLE='Test security issue from build'
  • LABELS=build
  • DRY_RUN=true
  • ODC_SARIF=true
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $1}'
  • OWNER=sett-and-hive
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $2}'
  • REPO=sarif-to-issue-action
  • '[' true == true ']'
  • fix_odc_sarif
  • ord_sarif=./test/fixtures/odc.sarif
  • mod_sarif=./test/fixtures/odc.sarif.mod
  • rm -f ./test/fixtures/odc.sarif.mod
  • jq '.runs[].tool.driver.rules[] |= . + {"defaultConfiguration": { "level": "error"}}' ./test/fixtures/odc.sarif
  • SARIF_FILE=./test/fixtures/odc.sarif.mod
  • echo 'Convert SARIF file ./test/fixtures/odc.sarif'
    Convert SARIF file ./test/fixtures/odc.sarif
  • npx @security-alert/sarif-to-issue --dryRun true --token fake-password --owner sett-and-hive --sarifContentOwner sett-and-hive --repo sarif-to-issue-action --sarifContentRepo sarif-to-issue-action --sarifContentBranch fake-test-branch --title 'Test security issue from build' --labels build ./test/fixtures/odc.sarif.mod
    Create Issue
    owner: sett-and-hive
    repo: sarif-to-issue-action
    labels: build
    assignees:
    title: Test security issue from build
    body: # Report

Results

  • [ERROR] [CVE-2022-24823] CVE-2022-24823 - Netty is an open-source, asynchronous event-driven network application framework. The package io.netty:netty-codec-httpprior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's ownjava.io.tmpdir when starting the JVM or use DefaultHttpDataFactory.setBaseDir\(...\) to set the directory to something that is only readable by the current user.

Suppressed Results

Nothing here.

Rules information

Rules details
- CVE-2022-24823 [undefined] 

> Medium severity - CVE-2022-24823 Exposure of Resource to Wrong Sphere vulnerability in pkg:maven/io.netty/netty-transport@4.1.76.Final

Tool information

  • Name: dependency-check
  • Organization: undefined
  • Version: undefined
  • echo output=0
    /app/entrypoint.sh: line 54: GITHUB_OUTPUT: unbound variable

@renovate renovate bot changed the title Update Node.js to 9ab44e3 Update Node.js to c47d5e7 Feb 25, 2025
@renovate renovate bot force-pushed the renovate/node.js branch from 9a47191 to c57d155 Compare February 25, 2025 11:46
Copy link

Testing script results from test/test.sh
✅ Test result: passes

Test script outputs from test/test.sh

  • set -C
  • SARIF_FILE=./test/fixtures/odc.sarif
  • TOKEN=fake-password
  • REPOSITORY=sett-and-hive/sarif-to-issue-action
  • BRANCH=fake-test-branch
  • TITLE='Test security issue from build'
  • LABELS=build
  • DRY_RUN=true
  • ODC_SARIF=true
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $1}'
  • OWNER=sett-and-hive
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $2}'
  • REPO=sarif-to-issue-action
  • '[' true == true ']'
  • fix_odc_sarif
  • ord_sarif=./test/fixtures/odc.sarif
  • mod_sarif=./test/fixtures/odc.sarif.mod
  • rm -f ./test/fixtures/odc.sarif.mod
  • jq '.runs[].tool.driver.rules[] |= . + {"defaultConfiguration": { "level": "error"}}' ./test/fixtures/odc.sarif
  • SARIF_FILE=./test/fixtures/odc.sarif.mod
  • echo 'Convert SARIF file ./test/fixtures/odc.sarif'
    Convert SARIF file ./test/fixtures/odc.sarif
  • npx @security-alert/sarif-to-issue --dryRun true --token fake-password --owner sett-and-hive --sarifContentOwner sett-and-hive --repo sarif-to-issue-action --sarifContentRepo sarif-to-issue-action --sarifContentBranch fake-test-branch --title 'Test security issue from build' --labels build ./test/fixtures/odc.sarif.mod
    Create Issue
    owner: sett-and-hive
    repo: sarif-to-issue-action
    labels: build
    assignees:
    title: Test security issue from build
    body: # Report

Results

  • [ERROR] [CVE-2022-24823] CVE-2022-24823 - Netty is an open-source, asynchronous event-driven network application framework. The package io.netty:netty-codec-httpprior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's ownjava.io.tmpdir when starting the JVM or use DefaultHttpDataFactory.setBaseDir\(...\) to set the directory to something that is only readable by the current user.

Suppressed Results

Nothing here.

Rules information

Rules details
- CVE-2022-24823 [undefined] 

> Medium severity - CVE-2022-24823 Exposure of Resource to Wrong Sphere vulnerability in pkg:maven/io.netty/netty-transport@4.1.76.Final

Tool information

  • Name: dependency-check
  • Organization: undefined
  • Version: undefined
  • echo output=0
    /app/entrypoint.sh: line 54: GITHUB_OUTPUT: unbound variable

@renovate renovate bot merged commit b192676 into main Feb 25, 2025
5 checks passed
@renovate renovate bot deleted the renovate/node.js branch February 25, 2025 16:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants