Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pin hash to a previous version in order to avoid the exploit #3374

Merged
merged 1 commit into from
Mar 15, 2025

Conversation

cmaureir
Copy link
Collaborator

This uses another version (v44) where I could find the hash (we currently used v45).

In summary, the repo got compromised and all the tags versions point to a malicius commit that includes a function to expose the secrets on the github action logs, so people can fetch them.

This uses another version (v44) where I could find the hash
(we currently used v45).

In summary, the repo got compromised and all the tags versions
point to a malicius commit that includes a function to expose
the secrets on the github action logs, so people can fetch them.
@cmaureir cmaureir merged commit 01e2ca8 into 3.13 Mar 15, 2025
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants