mc icon indicating copy to clipboard operation
mc copied to clipboard

Release new MC to close CVEs

Open jmthomas opened this issue 1 month ago • 3 comments

Expected behavior

Clean security scans (no CVEs)

Actual behavior

bin/mc (gobinary)
=================
Total: 6 (HIGH: 6, CRITICAL: 0)

┌─────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version  │                            Title                             │
├─────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼──────────────────────────────────────────────────────────────┤
│ stdlib  │ CVE-2025-47912 │ HIGH     │ fixed  │ v1.24.6           │ 1.24.8, 1.25.2 │ The Parse function permits values other than IPv6 addresses  │
│         │                │          │        │                   │                │ to be incl...                                                │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-47912                   │
│         ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-58183 │          │        │                   │                │ golang: archive/tar: Unbounded allocation when parsing GNU   │
│         │                │          │        │                   │                │ sparse map                                                   │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-58183                   │
│         ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-58186 │          │        │                   │                │ Despite HTTP headers having a default limit of 1MB, the      │
│         │                │          │        │                   │                │ number of...                                                 │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-58186                   │
│         ├────────────────┤          │        │                   ├────────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-58187 │          │        │                   │ 1.24.9, 1.25.3 │ Due to the design of the name constraint checking algorithm, │
│         │                │          │        │                   │                │ the proce...                                                 │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-58187                   │
│         ├────────────────┤          │        │                   ├────────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-58188 │          │        │                   │ 1.24.8, 1.25.2 │ Validating certificate chains which contain DSA public keys  │
│         │                │          │        │                   │                │ can cause ......                                             │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-58188                   │
│         ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-61724 │          │        │                   │                │ The Reader.ReadResponse function constructs a response       │
│         │                │          │        │                   │                │ string through ...                                           │
│         │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2025-61724                   │
└─────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴──────────────────────────────────────────────────────────────┘

Steps to reproduce the behavior

Run trivy on mc

mc --version

mc version RELEASE.2025-08-13T08-35-41Z (commit-id=7394ce0dd2a80935aded936b09fa12cbb3cb8096) Runtime: go1.24.6 linux/arm64 Copyright (c) 2015-2025 MinIO, Inc. License GNU AGPLv3 https://www.gnu.org/licenses/agpl-3.0.html

jmthomas avatar Nov 11 '25 17:11 jmthomas

Looking at go.mod I think you're already fixed with go1.24.9 ... you just need a new release. Thanks!

jmthomas avatar Nov 11 '25 17:11 jmthomas

Looking forward to a new release of MC with clean CVEs...Any word on when we can expect a release?

mcmcfaddin avatar Dec 04 '25 16:12 mcmcfaddin

Check out the minio/minio README. They aren't maintaining any of this anymore. I built mc from source in the meantime but we're moving on from minio as I suspect the entire community will do.

jmthomas avatar Dec 04 '25 17:12 jmthomas

Check out the minio/minio README. They aren't maintaining any of this anymore. I built mc from source in the meantime but we're moving on from minio as I suspect the entire community will do.

Hey, I'm wondering if you can share your alternative for mc tools. As for entire minio I have found rustfs and garagehq.

simonoff avatar Dec 12 '25 09:12 simonoff

We're also evaluating versitygw and garage

jmthomas avatar Dec 12 '25 16:12 jmthomas

Versitygw looks like have a lot of issues. I think we will go with garage.

simonoff avatar Dec 12 '25 19:12 simonoff