Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4)#589
Conversation
Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values. Vulnerability Details: - Advisory: GHSA-fjxv-7rqg-78g4 - Severity: Critical - CWE-330: Use of Insufficiently Random Values - Affected versions: <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 Packages Updated: - code/package-lock.json - code/extensions/che-activity-tracker/package-lock.json - code/extensions/che-api/package-lock.json - code/extensions/che-commands/package-lock.json - code/extensions/che-port/package-lock.json - code/extensions/che-remote/package-lock.json The form-data package is used as a transitive dependency through: - @types/node-fetch - axios - jsdom Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13. Generated-by: Claude CLI 🤖 Generated with [Claude Code](https://claude.com/claude-code) Co-Authored-By: Claude <noreply@anthropic.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
@RomanNikitenko please re-review my last changes. |
|
@sbouchet But I should mention that Some time ago we had a problem, see devfile/devworkspace-generator#201 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
see also che-incubator/che-code#589 Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
see also che-incubator/che-code#589 Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
PR merged : devfile/devworkspace-generator#271 (comment) |
Great! |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-589-amd64 |
) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values. Vulnerability Details: - Advisory: GHSA-fjxv-7rqg-78g4 - Severity: Critical - CWE-330: Use of Insufficiently Random Values - Affected versions: <2.5.4, 3.0.0-3.0.3, 4.0.0-4.0.3 Packages Updated: - code/package-lock.json - code/extensions/che-activity-tracker/package-lock.json - code/extensions/che-api/package-lock.json - code/extensions/che-commands/package-lock.json - code/extensions/che-port/package-lock.json - code/extensions/che-remote/package-lock.json The form-data package is used as a transitive dependency through: - @types/node-fetch - axios - jsdom Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13. Generated-by: Claude CLI 🤖 Generated with [Claude Code](https://claude.com/claude-code) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4) * update che devworkspace-generator version --------- Signed-off-by: Stephane Bouchet <sbouchet@redhat.com> Co-authored-by: Claude <noreply@anthropic.com>
|
@sbouchet please review them One more question: I see there is still |
hum. claude AI didn't see it and me too. need to create another PR for it :( |
What does this PR do?
Fix critical CVE in form-data package (GHSA-fjxv-7rqg-78g4)
What issues does this PR fix?
Updated form-data across multiple packages to address critical security vulnerability where unsafe random function was used for choosing boundary values.
Vulnerability Details:
Packages Updated:
The form-data package is used as a transitive dependency through:
Verification: npm audit confirms the critical form-data vulnerability has been resolved. Vulnerability count reduced from 14 to 13.
Generated-by: Claude CLI
🤖 Generated with Claude Code
How to test this PR?
Does this PR contain changes that override default upstream Code-OSS behavior?
git rebasewere added to the .rebase folder