chore(deps): update dependency ws to v8.17.1 [security] - autoclosed#1235
chore(deps): update dependency ws to v8.17.1 [security] - autoclosed#1235renovate[bot] wants to merge 1 commit intomainfrom
Conversation
|
| # Renovate security update: ws@8.17.1 | ||
| - ws@8.17.1 |
There was a problem hiding this comment.
🔴 ws downgraded to 8.17.1 violates ^8.18.0 version constraint in agents and openai plugin
This PR downgrades ws from 8.18.3 to 8.17.1 across the lockfile, but agents/package.json and plugins/openai/package.json both declare "ws": "^8.18.0" as their dependency constraint. The semver range ^8.18.0 means >=8.18.0 <9.0.0, so 8.17.1 does not satisfy it. The lockfile at pnpm-lock.yaml:199-201 and pnpm-lock.yaml:332-334 both show specifier: ^8.18.0 resolved to version: 8.17.1. This will cause pnpm install to fail or produce an inconsistent lockfile, breaking CI and local development.
Affected lockfile entries
agents (pnpm-lock.yaml:199-201):
ws:
specifier: ^8.18.0
version: 8.17.1
plugins/openai (pnpm-lock.yaml:332-334):
ws:
specifier: ^8.18.0
version: 8.17.1
Was this helpful? React with 👍 or 👎 to provide feedback.
6f92708 to
e023413
Compare
This PR contains the following updates:
8.17.0→8.17.1GitHub Vulnerability Alerts
CVE-2024-37890
Impact
A request with a number of headers exceeding the
server.maxHeadersCountthreshold could be used to crash a ws server.Proof of concept
Patches
The vulnerability was fixed in ws@8.17.1 (websockets/ws@e55e510) and backported to ws@7.5.10 (websockets/ws@22c2876), ws@6.2.3 (websockets/ws@eeb76d3), and ws@5.2.4 (websockets/ws@4abd8f6)
Workarounds
In vulnerable versions of ws, the issue can be mitigated in the following ways:
--max-http-header-size=sizeand/or themaxHeaderSizeoptions so that no more headers than theserver.maxHeadersCountlimit can be sent.server.maxHeadersCountto0so that no limit is applied.Credits
The vulnerability was reported by Ryan LaPointe in https://github.com/websockets/ws/issues/2230.
References
Release Notes
websockets/ws (ws)
v8.17.1Compare Source
Bug fixes
A request with a number of headers exceeding the
server.maxHeadersCountthreshold could be used to crash a ws server.
The vulnerability was reported by Ryan LaPointe in #2230.
In vulnerable versions of ws, the issue can be mitigated in the following ways:
--max-http-header-size=sizeand/or themaxHeaderSizeoptions sothat no more headers than the
server.maxHeadersCountlimit can be sent.server.maxHeadersCountto0so that no limit is applied.Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.