Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump vite from 5.2.3 to 5.2.6 in /desofs_svelte_front_end in the npm_and_yarn group across 1 directory #10

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Apr 29, 2024

Bumps the npm_and_yarn group with 1 update in the /desofs_svelte_front_end directory: vite.

Updates vite from 5.2.3 to 5.2.6

Changelog

Sourced from vite's changelog.

5.2.6 (2024-03-24)

5.2.5 (2024-03-24)

5.2.4 (2024-03-23)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore <dependency name> major version will close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself)
  • @dependabot ignore <dependency name> minor version will close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself)
  • @dependabot ignore <dependency name> will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself)
  • @dependabot unignore <dependency name> will remove all of the ignore conditions of the specified dependency
  • @dependabot unignore <dependency name> <ignore condition> will remove the ignore condition of the specified dependency and ignore conditions
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps the npm_and_yarn group with 1 update in the /desofs_svelte_front_end directory: [vite](https://github.com/vitejs/vite/tree/HEAD/packages/vite).


Updates `vite` from 5.2.3 to 5.2.6
- [Release notes](https://github.com/vitejs/vite/releases)
- [Changelog](https://github.com/vitejs/vite/blob/main/packages/vite/CHANGELOG.md)
- [Commits](https://github.com/vitejs/vite/commits/v5.2.6/packages/vite)

---
updated-dependencies:
- dependency-name: vite
  dependency-type: direct:development
  dependency-group: npm_and_yarn
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Apr 29, 2024
Copy link

Quality Gate Passed Quality Gate passed

Issues
0 New issues
0 Accepted issues

Measures
0 Security Hotspots
No data about Coverage
0.0% Duplication on New Code

See analysis details on SonarCloud

Copy link
Contributor

github-actions bot commented May 18, 2024

🔍 Vulnerabilities of 1230199/desofs2024_m1b_2-desof-web:latest

📦 Image Reference 1230199/desofs2024_m1b_2-desof-web:latest
digestsha256:46c3b9edb41bb28ce0959761e74729333a8a771824d7455146ad370d6ca50e51
vulnerabilitiescritical: 0 high: 0 medium: 0 low: 0 unspecified: 6
size466 MB
packages1054
📦 Base Image node:22
also known as
  • 22-bookworm
  • 22.2
  • 22.2-bookworm
  • 22.2.0
  • 22.2.0-bookworm
  • bookworm
  • current
  • current-bookworm
  • latest
digestsha256:e3f159a4782d8b73c271461c92e6eeac2393a6de70db7d8d9a7f8e5bf3ddf4b7
vulnerabilitiescritical: 1 high: 3 medium: 3 low: 104
critical: 0 high: 0 medium: 0 low: 0 unspecified: 6stdlib 1.20.12 (golang)

pkg:golang/[email protected]

unspecified : CVE--2024--24785

Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile10th percentile
Description

If errors returned from MarshalJSON methods contain user controlled data, they may be used to break the contextual auto-escaping behavior of the html/template package, allowing for subsequent actions to inject unexpected content into templates.

unspecified : CVE--2024--24784

Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile10th percentile
Description

The ParseAddressList function incorrectly handles comments (text within parentheses) within display names. Since this is a misalignment with conforming address parsers, it can result in different trust decisions being made by programs using different parsers.

unspecified : CVE--2024--24783

Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile10th percentile
Description

Verifying a certificate chain which contains a certificate with an unknown public key algorithm will cause Certificate.Verify to panic.

This affects all crypto/tls clients, and servers that set Config.ClientAuth to VerifyClientCertIfGiven or RequireAndVerifyClientCert. The default behavior is for TLS servers to not verify client certificates.

unspecified : CVE--2023--45290

Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile10th percentile
Description

When parsing a multipart form (either explicitly with Request.ParseMultipartForm or implicitly with Request.FormValue, Request.PostFormValue, or Request.FormFile), limits on the total size of the parsed form were not applied to the memory consumed while reading a single form line. This permits a maliciously crafted input containing very long lines to cause allocation of arbitrarily large amounts of memory, potentially leading to memory exhaustion.

With fix, the ParseMultipartForm function now correctly limits the maximum size of form lines.

unspecified : CVE--2023--45289

Affected range<1.21.8
Fixed version1.21.8
EPSS Score0.04%
EPSS Percentile10th percentile
Description

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not.

A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

unspecified : CVE--2023--45288

Affected range<1.21.9
Fixed version1.21.9
EPSS Score0.04%
EPSS Percentile13th percentile
Description

An attacker may cause an HTTP/2 endpoint to read arbitrary amounts of header data by sending an excessive number of CONTINUATION frames.

Maintaining HPACK state requires parsing and processing all HEADERS and CONTINUATION frames on a connection. When a request's headers exceed MaxHeaderBytes, no memory is allocated to store the excess headers, but they are still parsed.

This permits an attacker to cause an HTTP/2 endpoint to read arbitrary amounts of header data, all associated with a request which is going to be rejected. These headers can include Huffman-encoded data which is significantly more expensive for the receiver to decode than for an attacker to send.

The fix sets a limit on the amount of excess header frames we will process before closing a connection.

Copy link
Contributor

github-actions bot commented May 18, 2024

Recommended fixes for image 1230199/desofs2024_m1b_2-desof-web:latest

Base image is node:22

Namecurrent
Digestsha256:e3f159a4782d8b73c271461c92e6eeac2393a6de70db7d8d9a7f8e5bf3ddf4b7
Vulnerabilitiescritical: 1 high: 3 medium: 3 low: 104
Pushed1 day ago
Size402 MB
Packages747
Runtime22
The base image is also available under the supported tag(s): 22-bookworm, 22.2, 22.2-bookworm, 22.2.0, 22.2.0-bookworm, bookworm, current, current-bookworm, latest

Refresh base image

Rebuild the image using a newer base image version. Updating this may result in breaking changes.

✅ This image version is up to date.

Change base image

TagDetailsPushedVulnerabilities
22-slim
Tag is preferred tag
Also known as:
  • 22.2.0-slim
  • 22.2-slim
  • current-slim
  • slim
  • bookworm-slim
  • 22-bookworm-slim
  • 22.2-bookworm-slim
  • 22.2.0-bookworm-slim
  • current-bookworm-slim
Benefits:
  • Image is smaller by 312 MB
  • Image contains 423 fewer packages
  • Tag is preferred tag
  • Tag was pushed more recently
  • Image introduces no new vulnerability but removes 88
  • Tag is using slim variant
Image details:
  • Size: 76 MB
  • Runtime: 22
1 day ago



Copy link
Contributor

github-actions bot commented May 18, 2024

Your image 1230199/desofs2024_m1b_2-desof-web:latest critical: 1 high: 3 medium: 3 low: 104 unspecified: 6
Current base image node:22 critical: 1 high: 3 medium: 3 low: 104
Updated base image node:22-slim critical: 0 high: 0 medium: 0 low: 23

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant