-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-37466 - VM2 - Sandbox Escape Vulnerability #571
Comments
hello and thank you for submitting this issue ! seems to come from one of there seems to be an Issue submitted over there too about the same concern: TooTallNate/proxy-agents#218 we'll see what we can do on our end (besides upgrading to |
Are there any predictions on when will the problem be solved and new npm version released? |
a great question. for the in my own personal opinion it is unlikely the fix makes it into the July driver release, given the release date is already close. i can still be wrong though! on the same note I would very much like to mention a robbkidd's comment from over the
to me, the above means that if you're not using a |
quick update: upstream issue in |
FYI: Upvoting this issue as this vulnerability is also being flagged on our end by snyk:
(that being said - I could upgrade to the lastest 1.6.23 version) |
1.6.23 does not fix this issue, but they're working on it so the next release will |
about the release timeline - please see this comment. freeze for this month's release is quite close so really doubt it'll make it into this month's release. |
hi folks I have some update. so the vulnerability has been eliminated from this is a short-term stopgap hotfix, and it works by excluding the this approach uses the overrides directive, which due to how change is available right now in the main branch, and will be released with the upcoming next version of the driver towards end of July. on the long-term for the proper approach, we'll replace the old |
and now, delicacies of But if you don't do that and have a project of which How to make it work then ? demonstrating on one of the overridden packages,
"overrides": {
"@azure/storage-blob": {
"node-fetch": "^3.2.10"
},
"semver": "^7.5.2",
"vm2": "../_EXCLUDED_"
}, However, # npm ls semver
node@ /node
`-- [email protected] (git+ssh://[email protected]/snowflakedb/snowflake-connector-nodejs.git#4cacb2ca2d0258c38083f92874412e2e7f3c681f)
+-- [email protected]
| `-- [email protected]
`-- [email protected]
`-- [email protected]
`-- [email protected]
`-- [email protected]
`-- [email protected]. <<< this should be major version 7 due to the override
# cat package.json
{
"dependencies": {
"log-timestamp": "^0.3.0",
"snowflake-sdk": "github:snowflakedb/snowflake-connector-nodejs"
}
} No # cat package.json
{
"dependencies": {
"log-timestamp": "^0.3.0",
"snowflake-sdk": "github:snowflakedb/snowflake-connector-nodejs"
},
"overrides": {
"@azure/storage-blob": {
"node-fetch": "^3.2.10"
},
"semver": "^7.5.2",
"vm2": "../_EXCLUDED_"
}
}
# npm ls semver
node@ /node
`-- [email protected] (git+ssh://[email protected]/snowflakedb/snowflake-connector-nodejs.git#4cacb2ca2d0258c38083f92874412e2e7f3c681f)
+-- [email protected]
| `-- [email protected] overridden. <<< override now took effect
`-- [email protected]
`-- [email protected]
`-- [email protected]
`-- [email protected]
`-- [email protected] deduped. <<< override now took effect |
@sfc-gh-dszmolka thank you for the updates and the quick action on this issue. Unfortunately our attempt to mirror this change in our own repository (using the Do you have any timeline for the urllib/long term changes mentioned in your comments? Any advice on making these changes play nicely with Thanks! |
no, sadly I couldn't make this work with for the long term fix timelines, at this very moment of writing I cannot comment on any timeline but will do as soon as I'm able to. What I can tell though, the long term fix for challenges introduced by edit: expected to be completed by Q3 end, but again: high priority and we aim to do it sooner. I'll also raise a separate issue in the repo to keep track of the efforts. |
I'm happy to see a fix is being worked on for this. Thank you. I'm curious when your Q3 is @sfc-gh-dszmolka . |
@deej-split for long term solution, you can also follow #590 Our Q3 ends with October 2023. No, this doesn't mean we aim for the long-term solution to be deployed on 31 October :) this one will be closed down upon release of the next Snowflake Node.JS connector, as it's been resolved with a short-term fix. |
While we are waiting for the next release to fix this vulnerability, we did a poor man's We used npm-dependency-exclusion
Snyk scan passed. This unblocked our deployment pipelines. Let me know if this works for anyone. |
PR is released as part of the latest Snowflake Node.JS driver version 1.7.0. Closing this issue. |
Releng team hit a bump in the release process which will be continued on Monday as expected. Reopening the issue and will only close when artifact confirmed to published to npm. Apologies for the inconvenience. |
PR is released as part of the latest Snowflake Node.JS driver version 1.7.0, for real this time :) Visible on note: as mentioned in an above comment, this is a workaround , a stopgap hotfix to address the security vulnerability. for a long term proper solution we'll replace urllib v2, and there's a separate issue open for that which you can follow if you're interested (#590 ) |
Thanks again for all the information and updates @sfc-gh-dszmolka. I also wanted to close the loop on my earlier question with
|
update: apparently urllib v2 had a new release edit: due to above circumstances, the short-term workaround is not necessary anymore, so we reverted it (#614), thus the exclusion won't be part of the next release and going forward. |
Thank you for the update @sfc-gh-dszmolka. Will there be a patch version bump soon that will include this? |
Yes, since the PR is already merged, it will be part of the next release. Normally, we release client drivers in the second half of the month, so this should be out by end of August. |
the |
CVE-2023-37466 - VM2 - Sandbox Escape Vulnerability
The VM2 Package is vulnerable to Sandbox Escape. As of this week, the VM2 Project has been discontinued.
CVE-2023-37466
The text was updated successfully, but these errors were encountered: