fix: upgrade path-to-regexp to 8.4.0 (CVE-2026-4926)#24728
fix: upgrade path-to-regexp to 8.4.0 (CVE-2026-4926)#24728orbisai0security wants to merge 2 commits intogoogle-gemini:mainfrom
Conversation
Automated dependency upgrade by Orbis Security AI
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request addresses a high-severity security vulnerability identified in the path-to-regexp package. By updating the dependency to the latest patched version, the application is protected against potential Denial of Service attacks caused by crafted regular expressions. Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request updates the project dependencies by adding 'path-to-regexp' version 8.4.0 to both 'package.json' and 'package-lock.json', while simultaneously removing the redundant 'path-to-regexp' version 8.2.0 dependency from the lock file. I have no feedback to provide as there are no review comments.
Note: Security Review has been skipped due to the limited scope of the PR.
Summary
Upgrade path-to-regexp from 8.2.0 to 8.4.0 to fix CVE-2026-4926.
Vulnerability
CVE-2026-4926package-lock.jsonDescription: path-to-regexp: path-to-regexp: Denial of Service via crafted regular expressions
Changes
package.jsonpackage-lock.jsonVerification
Automated security fix by OrbisAI Security