Skip to content

Commit a904e31

Browse files
doc: add CVE to security incident item (#2495)
* doc: add CVE to security incident item * [pre-commit.ci] auto fixes from pre-commit.com hooks for more information, see https://pre-commit.ci --------- Co-authored-by: pre-commit-ci[bot] <66853113+pre-commit-ci[bot]@users.noreply.github.com>
1 parent fdfa9a4 commit a904e31

File tree

1 file changed

+13
-14
lines changed

1 file changed

+13
-14
lines changed
Lines changed: 13 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
# Security Incident with Package Uploads
1+
# Security Incident with Package Uploads (CVE-2025-31484)
22

3-
Yesterday, ``conda-forge`` was notified of a security incident reporting that the ``anaconda.org`` upload token
4-
for the ``conda-forge`` channel had been accidentally leaked between on or about 2025-02-10 to 2025-04-01. Our
3+
Yesterday, `conda-forge` was notified of a security incident reporting that the `anaconda.org` upload token
4+
for the `conda-forge` channel had been accidentally leaked between on or about 2025-02-10 to 2025-04-01. Our
55
investigation resulted in the temporary artifact upload shutdown you observed yesterday (2025-04-01). The results
66
of our analysis show that, as best as can reasonably be determined, the token was not used by any 3rd party to
77
upload malicious artifacts.
@@ -12,37 +12,37 @@ More details below the fold.
1212

1313
## Report details
1414

15-
In the past few months, ``conda-forge`` has been engaging with an external security audit in collaboration with
15+
In the past few months, `conda-forge` has been engaging with an external security audit in collaboration with
1616
the [Open Source Technology Improvement Fund](https://ostif.org/) (OSTIF). The full results of this audit will be
1717
made public once it is complete per OSTIF responsible disclosure policies.
1818

19-
During this process, OSTIF and their contractor uncovered misconfigured infrastructure which exposed the ``anaconda.org``
20-
token for the ``conda-forge`` channel to all feedstock maintainers. The token was exposed from on or about 2025-02-10 through
19+
During this process, OSTIF and their contractor uncovered misconfigured infrastructure which exposed the `anaconda.org`
20+
token for the `conda-forge` channel to all feedstock maintainers. The token was exposed from on or about 2025-02-10 through
2121
2025-04-01. See our [GitHub Security Advisory](https://github.com/conda-forge/infrastructure/security/advisories/GHSA-m4h2-49xf-vq72)
2222
for more details.
2323

2424
We have requested a CVE from GitHub and will amend this announcement once it is issued. Our response to this
2525
incident is detailed below, but TL;DR, as best as can reasonably be determined, **no packages were compromised
2626
during this time**.
2727

28-
Thank you for using ``conda-forge``, please [contact us](https://conda-forge.org/community/getting-in-touch/) if you
28+
Thank you for using `conda-forge`, please [contact us](https://conda-forge.org/community/getting-in-touch/) if you
2929
have further questions, and please follow our [security process](https://github.com/conda-forge/conda-forge.github.io/blob/main/SECURITY.md)
3030
for responsible reporting of vulnerabilities.
3131

32-
**Finally, as a reminder, ``conda-forge`` packages are built by strangers on the internet (our wonderful feedstock
32+
**Finally, as a reminder, `conda-forge` packages are built by strangers on the internet (our wonderful feedstock
3333
maintainers!) and are not suitable for use cases that require secure software provenance.**
3434

3535
## Response timeline
3636

3737
The timeline and details of our response to this security incident are as follows:
3838

39-
- 2025-04-01 13:35 UTC: OSTIF and their contractor notified ``conda-forge`` of the leaked token.
40-
- 2025-04-01 14:00 UTC: The ``conda-forge/core`` team acknowledged receipt of the report and
39+
- 2025-04-01 13:35 UTC: OSTIF and their contractor notified `conda-forge` of the leaked token.
40+
- 2025-04-01 14:00 UTC: The `conda-forge/core` team acknowledged receipt of the report and
4141
started conducting the investigation.
42-
- 2025-04-01 14:15 UTC: The ``conda-forge/core`` team disabled the token and stopped uploads to ``anaconda.org``.
42+
- 2025-04-01 14:15 UTC: The `conda-forge/core` team disabled the token and stopped uploads to `anaconda.org`.
4343
- 2025-04-01 14:20 UTC: We posted an [incident](https://github.com/conda-forge/status/issues/194)
4444
to our status page reporting that uploads were temporarily paused.
45-
- 2025-04-01 15:19 UTC: We audited all uploads to the ``conda-forge`` channel, looking for uploads that
45+
- 2025-04-01 15:19 UTC: We audited all uploads to the `conda-forge` channel, looking for uploads that
4646
bypassed our upload staging process. We did not find any. This check is not completely robust, but it
4747
does indicate that nothing was obviously compromised.
4848
- 2025-04-01 15:53 UTC: We decided to delay disclosure by one day to 2025-04-02 in order to not generate
@@ -51,5 +51,4 @@ The timeline and details of our response to this security incident are as follow
5151
- 2025-04-01 21:39 UTC: We deployed a fix to our infrastructure.
5252
- 2025-04-01 22:20 UTC: We then deployed a new token to our infrastructure and restarted uploads.
5353
- 2025-04-01 23:02 UTC: The status page [incident](https://github.com/conda-forge/status/issues/194) was marked as resolved.
54-
- 2025-04-02: We published this announcement and the advisory. We requested a CVE from GitHub and will update this
55-
notice when we get the number.
54+
- 2025-04-02: We published this announcement and the advisory. GitHub produced CVE-2025-31484 for us based on our security advisory.

0 commit comments

Comments
 (0)