Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency undici to 5.19.1 [SECURITY] #1367

Merged
merged 1 commit into from
Feb 18, 2023

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Feb 16, 2023

Mend Renovate

This PR contains the following updates:

Package Change
undici 5.16.0 -> 5.19.1

GitHub Vulnerability Alerts

CVE-2023-23936

Impact

undici library does not protect host HTTP header from CRLF injection vulnerabilities.

Patches

This issue was patched in Undici v5.19.1.

Workarounds

Sanitize the headers.host string before passing to undici.

References

Reported at https://hackerone.com/reports/1820955.

Credits

Thank you to Zhipeng Zhang (@​timon8) for reporting this vulnerability.

CVE-2023-24807

Impact

The Headers.set() and Headers.append() methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular expression used to normalize the values in the headerValueNormalize() utility function.

Patches

This vulnerability was patched in v5.19.1.

Workarounds

There is no workaround. Please update to an unaffected version.

References

Credits

Carter Snook reported this vulnerability.


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@netlify
Copy link

netlify bot commented Feb 16, 2023

Deploy Preview for zarf-docs canceled.

Name Link
🔨 Latest commit ae735f4
🔍 Latest deploy log https://app.netlify.com/sites/zarf-docs/deploys/63eebf639288b10008484e6f

1 similar comment
@netlify
Copy link

netlify bot commented Feb 16, 2023

Deploy Preview for zarf-docs canceled.

Name Link
🔨 Latest commit ae735f4
🔍 Latest deploy log https://app.netlify.com/sites/zarf-docs/deploys/63eebf639288b10008484e6f

@Racer159 Racer159 merged commit c3551ed into main Feb 18, 2023
@Racer159 Racer159 deleted the renovate/npm-undici-vulnerability branch February 18, 2023 20:56
Noxsios pushed a commit that referenced this pull request Mar 8, 2023
[![Mend
Renovate](https://app.renovatebot.com/images/banner.svg)](https://renovatebot.com)

This PR contains the following updates:

| Package | Change |
|---|---|
| undici | [`5.16.0` ->
`5.19.1`](https://renovatebot.com/diffs/npm/undici/5.16.0/5.19.1) |

### GitHub Vulnerability Alerts

####
[CVE-2023-23936](https://togithub.com/nodejs/undici/security/advisories/GHSA-5r9g-qh6m-jxff)

### Impact

undici library does not protect `host` HTTP header from CRLF injection
vulnerabilities.

### Patches

This issue was patched in Undici v5.19.1.

### Workarounds

Sanitize the `headers.host` string before passing to undici.

### References

Reported at https://hackerone.com/reports/1820955.

### Credits

Thank you to Zhipeng Zhang
([@​timon8](https://hackerone.com/timon8)) for reporting this
vulnerability.

####
[CVE-2023-24807](https://togithub.com/nodejs/undici/security/advisories/GHSA-r6ch-mqf9-qc9w)

### Impact
The `Headers.set()` and `Headers.append()` methods are vulnerable to
Regular Expression Denial of Service (ReDoS) attacks when untrusted
values are passed into the functions. This is due to the inefficient
regular expression used to normalize the values in the
`headerValueNormalize()` utility function.

### Patches

This vulnerability was patched in v5.19.1.

### Workarounds
There is no workaround. Please update to an unaffected version.

### References

* https://hackerone.com/bugs?report_id=1784449

### Credits

Carter Snook reported this vulnerability.

---

### Configuration

📅 **Schedule**: Branch creation - "" (UTC), Automerge - At any time (no
schedule defined).

🚦 **Automerge**: Disabled by config. Please merge this manually once you
are satisfied.

♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the
rebase/retry checkbox.

🔕 **Ignore**: Close this PR and you won't be reminded about this update
again.

---

- [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check
this box

---

This PR has been generated by [Mend
Renovate](https://www.mend.io/free-developer-tools/renovate/). View
repository job log
[here](https://app.renovatebot.com/dashboard#github/defenseunicorns/zarf).

<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiIzNC4xNDIuMSIsInVwZGF0ZWRJblZlciI6IjM0LjE0Mi4xIn0=-->

Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants