-
Notifications
You must be signed in to change notification settings - Fork 45
Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) #589
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values. Vulnerability Details: - Advisory: GHSA-fjxv-7rqg-78g4 - Severity: Critical - CWE-330: Use of Insufficiently Random Values - Affected versions: <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 Packages Updated: - code/package-lock.json - code/extensions/che-activity-tracker/package-lock.json - code/extensions/che-api/package-lock.json - code/extensions/che-commands/package-lock.json - code/extensions/che-port/package-lock.json - code/extensions/che-remote/package-lock.json The form-data package is used as a transitive dependency through: - @types/node-fetch - axios - jsdom Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13. Generated-by: Claude CLI 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <[email protected]>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <[email protected]>
Signed-off-by: Stephane Bouchet <[email protected]>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <[email protected]>
Signed-off-by: Stephane Bouchet <[email protected]>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <[email protected]>
|
@RomanNikitenko please re-review my last changes. |
|
@sbouchet But I should mention that Some time ago we had a problem, see devfile/devworkspace-generator#201 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
see also che-incubator/che-code#589 Signed-off-by: Stephane Bouchet <[email protected]>
see also che-incubator/che-code#589 Signed-off-by: Stephane Bouchet <[email protected]>
PR merged : devfile/devworkspace-generator#271 (comment) |
Great! |
Signed-off-by: Stephane Bouchet <[email protected]>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values. Vulnerability Details: - Advisory: GHSA-fjxv-7rqg-78g4 - Severity: Critical - CWE-330: Use of Insufficiently Random Values - Affected versions: <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 Packages Updated: - code/package-lock.json - code/extensions/che-activity-tracker/package-lock.json - code/extensions/che-api/package-lock.json - code/extensions/che-commands/package-lock.json - code/extensions/che-port/package-lock.json - code/extensions/che-remote/package-lock.json The form-data package is used as a transitive dependency through: - @types/node-fetch - axios - jsdom Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13. Generated-by: Claude CLI 🤖 Generated with [Claude Code](https://claude.com/claude-code) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * update che devworkspace-generator version --------- Signed-off-by: Stephane Bouchet <[email protected]> Co-authored-by: Claude <[email protected]>
|
@sbouchet please review them One more question: I see there is still |
hum. claude AI didn't see it and me too. need to create another PR for it :( |
What does this PR do?
Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4)
What issues does this PR fix?
Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values.
Vulnerability Details:
Packages Updated:
The form-data package is used as a transitive dependency through:
Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13.
Generated-by: Claude CLI
🤖 Generated with Claude Code
How to test this PR?
Does this PR contain changes that override default upstream Code-OSS behavior?
git rebasewere added to the .rebase folder