Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update step-security/harden-runner digest to 41d3351 #1163

Merged
merged 1 commit into from
Feb 27, 2025

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 27, 2025

This PR contains the following updates:

Package Type Update Change
step-security/harden-runner action digest 0f3c98a -> 41d3351

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Configuration

📅 Schedule: Branch creation - "after 8pm every weekday,before 10am every weekday,every weekend" in timezone America/Chicago, Automerge - At any time (no schedule defined).

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot added the renovate label Feb 27, 2025
Copy link

Testing script results from test/test.sh
✅ Test result: passes

Test script outputs from test/test.sh

  • set -C
  • SARIF_FILE=./test/fixtures/odc.sarif
  • TOKEN=fake-password
  • REPOSITORY=sett-and-hive/sarif-to-issue-action
  • BRANCH=fake-test-branch
  • TITLE='Test security issue from build'
  • LABELS=build
  • DRY_RUN=true
  • ODC_SARIF=true
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $1}'
  • OWNER=sett-and-hive
    ++ echo sett-and-hive/sarif-to-issue-action
    ++ awk '-F[/]' '{print $2}'
  • REPO=sarif-to-issue-action
  • '[' true == true ']'
  • fix_odc_sarif
  • ord_sarif=./test/fixtures/odc.sarif
  • mod_sarif=./test/fixtures/odc.sarif.mod
  • rm -f ./test/fixtures/odc.sarif.mod
  • jq '.runs[].tool.driver.rules[] |= . + {"defaultConfiguration": { "level": "error"}}' ./test/fixtures/odc.sarif
  • SARIF_FILE=./test/fixtures/odc.sarif.mod
  • echo 'Convert SARIF file ./test/fixtures/odc.sarif'
    Convert SARIF file ./test/fixtures/odc.sarif
  • npx @security-alert/sarif-to-issue --dryRun true --token fake-password --owner sett-and-hive --sarifContentOwner sett-and-hive --repo sarif-to-issue-action --sarifContentRepo sarif-to-issue-action --sarifContentBranch fake-test-branch --title 'Test security issue from build' --labels build ./test/fixtures/odc.sarif.mod
    Create Issue
    owner: sett-and-hive
    repo: sarif-to-issue-action
    labels: build
    assignees:
    title: Test security issue from build
    body: # Report

Results

  • [ERROR] [CVE-2022-24823] CVE-2022-24823 - Netty is an open-source, asynchronous event-driven network application framework. The package io.netty:netty-codec-httpprior to version 4.1.77.Final contains an insufficient fix for CVE-2021-21290. When Netty's multipart decoders are used local information disclosure can occur via the local system temporary directory if temporary storing uploads on the disk is enabled. This only impacts applications running on Java version 6 and lower. Additionally, this vulnerability impacts code running on Unix-like systems, and very old versions of Mac OSX and Windows as they all share the system temporary directory between all users. Version 4.1.77.Final contains a patch for this vulnerability. As a workaround, specify one's ownjava.io.tmpdir when starting the JVM or use DefaultHttpDataFactory.setBaseDir\(...\) to set the directory to something that is only readable by the current user.

Suppressed Results

Nothing here.

Rules information

Rules details
- CVE-2022-24823 [undefined] 

> Medium severity - CVE-2022-24823 Exposure of Resource to Wrong Sphere vulnerability in pkg:maven/io.netty/netty-transport@4.1.76.Final

Tool information

  • Name: dependency-check
  • Organization: undefined
  • Version: undefined
  • echo output=0
    /app/entrypoint.sh: line 54: GITHUB_OUTPUT: unbound variable

@renovate renovate bot merged commit c70d922 into main Feb 27, 2025
5 checks passed
@renovate renovate bot deleted the renovate/step-security-harden-runner-digest branch February 27, 2025 06:43
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants