-
Notifications
You must be signed in to change notification settings - Fork 222
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
build(deps): bump cross-spawn to 7.0.5 #2493
build(deps): bump cross-spawn to 7.0.5 #2493
Conversation
Bumps [webpack](https://github.com/webpack/webpack) from 5.88.2 to 5.95.0. - [Release notes](https://github.com/webpack/webpack/releases) - [Commits](webpack/webpack@v5.88.2...v5.95.0) --- updated-dependencies: - dependency-name: webpack dependency-type: direct:development ... Signed-off-by: dependabot[bot] <[email protected]>
fix Regular Expression Denial of Service (ReDoS) in cross-spawn - GHSA-3xgq-45jj-v275
WalkthroughThe pull request updates the Changes
Poem
📜 Recent review detailsConfiguration used: CodeRabbit UI ⛔ Files ignored due to path filters (1)
📒 Files selected for processing (1)
🔇 Additional comments (1)
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
🧩 Analysis chain@CharlVS I'll review the changes in this PR, focusing on the cross-spawn dependency update and its security implications. 🏁 Script executed:
Length of output: 741 🌐 Web query:
💡 Result: The security vulnerability GHSA-3xgq-45jj-v275 (CVE-2024-21538) in Vulnerability Overview
Technical Details
Affected Versions
Remediation
Real-World ImpactWhile primarily affecting development environments (since Patches were widely adopted by December 2024, with major ecosystems like Joomla resolving it in version 4.4.10[6]. Citations:
🏁 Script executed:
Length of output: 57736 @CharlVS The PR successfully updates 🏁 Script executed:
Length of output: 50 @CharlVS I've confirmed that ✅ Actions performedComments resolved. Review triggered.
|
@takenagain, will this be redundant with the next major release (which removes Webpack)? If so, please resolve the merge conflicts with the deps freshly resolved, or if that's not the case, please close the PR. |
This will be redundant with the next major release. The Node.js build step was removed on the |
Fix Regular Expression Denial of Service (ReDoS) in cross-spawn - GHSA-3xgq-45jj-v275
Summary by CodeRabbit