Update cross-spawn to version 7.0.6 #116
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Update cross-spawn from 7.0.3 to 7.0.6
Merge this pull request to resolve a vulnerability in cross-spawn.
The vulnerability
cross-spawn: regular expression denial of service
Versions of the package cross-spawn before 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS) due to improper input sanitization. An attacker can increase the CPU usage and crash the program by crafting a very large and well crafted string.
References
https://access.redhat.com/security/cve/CVE-2024-21538
https://github.com/moxystudio/node-cross-spawn
moxystudio/node-cross-spawn@5ff3a07
moxystudio/node-cross-spawn@640d391
moxystudio/node-cross-spawn@d35c865
Backport GHSA-3xgq-45jj-v275 moxystudio/node-cross-spawn#165
fix: disable regexp backtracking moxystudio/node-cross-spawn#160
https://nvd.nist.gov/vuln/detail/CVE-2024-21538
https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349
https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230
https://www.cve.org/CVERecord?id=CVE-2024-21538
Publish date
2024-11-08 05:15:06.453000+00:00