Fix undici security vulnerability (GHSA-g9mf-h72j-4rw9) #10178
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Addresses low-severity vulnerability in undici (CVSS 3.7) allowing unbounded decompression chain in HTTP responses, potentially causing resource exhaustion.
Changes
actions/setup/js/package.jsonto forceundici ^6.23.0package-lock.jsonto reflect secure version (5.29.0 → 6.23.0)Technical Details
The override ensures all instances of undici—including transitive dependencies via
@actions/githuband@actions/http-client—use the patched version:{ "overrides": { "undici": "^6.23.0" } }This resolves all 3 npm audit findings without breaking changes.
Warning
Firewall rules blocked me from connecting to one or more addresses (expand for details)
I tried to connect to the following addresses, but was blocked by firewall rules:
vuln.go.dev/home/REDACTED/go/bin/govulncheck govulncheck ./...(dns block)If you need me to access, download, or install something from one of these locations, you can either:
Original prompt
💬 We'd love your input! Share your thoughts on Copilot coding agent in our 2 minute survey.