Skip to content

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Oct 2, 2025

Bumps undici from 5.28.4 to 5.29.0.

Release notes

Sourced from undici's releases.

v5.29.0

What's Changed

Full Changelog: nodejs/undici@v5.28.5...v5.29.0

v5.28.5

⚠️ Security Release ⚠️

Fixes CVE CVE-2025-22150 GHSA-c76h-2ccp-4975 (embargoed until 22-01-2025).

Full Changelog: nodejs/undici@v5.28.4...v5.28.5

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [undici](https://github.com/nodejs/undici) from 5.28.4 to 5.29.0.
- [Release notes](https://github.com/nodejs/undici/releases)
- [Commits](nodejs/undici@v5.28.4...v5.29.0)

---
updated-dependencies:
- dependency-name: undici
  dependency-version: 5.29.0
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels Oct 2, 2025
@ibcheckmarx
Copy link

Logo
Checkmarx One – Scan Summary & Details78f26a09-8684-4cb8-8a74-008b328bd4dd

New Issues (13)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
HIGH CVE-2024-21538 Npm-cross-spawn-7.0.3
detailsRecommended version: 7.0.5
Description: Versions of the package cross-spawn prior to 6.0.6 and 7.x prior to 7.0.5 are vulnerable to Regular Expression Denial of Service (ReDoS), due to im...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 19dJsgrWv5inETOfBGvinJ7GgnbKDtTrewNw79DaCew%3D
Vulnerable Package
HIGH CVE-2024-4068 Npm-braces-3.0.2
detailsRecommended version: 3.0.3
Description: The NPM package "braces", versions prior to 3.0.3, fails to limit the number of characters it can handle, which could lead to Memory Exhaustion. In...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: cOkTt%2BI30caOmg2VpSqkOzWUbTSas7%2Fi9eCIyOLt%2F7s%3D
Vulnerable Package
HIGH Cxdca8e59f-8bfe Npm-inflight-1.0.6
detailsDescription: In NPM `inflight` there is a Memory Leak because some resources are not freed correctly after being used. It appears to affect all versions, as the...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: qok%2FqIvX8QlF%2BQlQr2vi5%2FDIDcXCDnDO0TxbupCZ%2FlQ%3D
Vulnerable Package
MEDIUM CVE-2024-4067 Npm-micromatch-4.0.5
detailsRecommended version: 4.0.8
Description: The NPM package "micromatch" prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in "micromatch....
Attack Vector: NETWORK
Attack Complexity: LOW

ID: kD3vrKIu5y6jOotgUl1XF27lk3eczknm6uNfy52Sa98%3D
Vulnerable Package
MEDIUM CVE-2025-25285 Npm-@octokit/endpoint-9.0.5
detailsRecommended version: 9.0.6
Description: The package @octokit/endpoint turns REST API endpoints into generic request options. In versions 9.0.5, and 10.0.0-beta.1 through 10.1.2, by crafti...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: xXsauvesRtoFaZ8VTkOy5pvObpUKAb7LRe6rLrIdsRk%3D
Vulnerable Package
MEDIUM CVE-2025-25288 Npm-@octokit/plugin-paginate-rest-9.2.1
detailsRecommended version: 9.2.2
Description: The package @octokit/plugin-paginate-rest is the Octokit plugin to paginate REST API endpoint responses. In versions through 9.2.1 and 9.3.0-beta.1...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: ROQXen21l%2FpaIOEVbF8OGoVx3sNP6YAaVS2lVKQ1bd0%3D
Vulnerable Package
MEDIUM CVE-2025-25289 Npm-@octokit/request-error-5.1.0
detailsRecommended version: 5.1.1
Description: The package @octokit/request-error is an error class for Octokit request errors. A Regular Expression Denial of Service (ReDoS) vulnerability exist...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 4cELUxOGA2jzDd8%2BmhOh0Q%2FLWoFVjtj1zSoK2Q9wHUA%3D
Vulnerable Package
MEDIUM CVE-2025-25290 Npm-@octokit/request-8.4.0
detailsRecommended version: 8.4.1
Description: @octokit/request sends parameterized requests to GitHub's APIs with sensible defaults in browsers and Node. Starting in versions 1.0.0 through 8.4....
Attack Vector: NETWORK
Attack Complexity: LOW

ID: PnGmtcEdDeWVrB9QizSNdQF9wyM07jbnglaXqpx4LtQ%3D
Vulnerable Package
LOW CVE-2025-5889 Npm-brace-expansion-1.1.11
detailsRecommended version: 1.1.12
Description: A vulnerability was found in juliangruber brace-expansion. It has been rated as problematic. Affected by this issue is the function "expand" of the...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: Ka%2BWjAwyDnDfesM4e4%2B7YsX5BT4Ko4%2BHMqRmdc4L37Y%3D
Vulnerable Package
LOW CVE-2025-5889 Npm-brace-expansion-2.0.1
detailsRecommended version: 2.0.2
Description: A vulnerability was found in juliangruber brace-expansion. It has been rated as problematic. Affected by this issue is the function "expand" of the...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: q1Vz%2F77Um6%2B9szVc1%2F7AYCqaj2AaSwa8W%2B8b9fQ%2FacQ%3D
Vulnerable Package
LOW Cx8bc4df28-fcf5 Npm-debug-4.3.4
detailsRecommended version: 4.4.0
Description: In NPM "debug" versions prior to 4.4.0, the "enable" function accepts a regular expression from user input without escaping it. Arbitrary regular e...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: c8uMXAITN9ng0TanqLUO3UTb1MpMKGVdkcUM65IEYys%3D
Vulnerable Package
LOW Unpinned Actions Full Length Commit SHA /build-test.yaml: 98
detailsPinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA help...
ID: YOfLLVzkErjHfVeLpFz0i3xwGRw%3D
LOW Unpinned Actions Full Length Commit SHA /build-test.yaml: 286
detailsPinning an action to a full length commit SHA is currently the only way to use an action as an immutable release. Pinning to a particular SHA help...
ID: sBUzBaaFqmg%2B1OUiEgEiZ9JFAQk%3D

Use @Checkmarx to reach out to us for assistance.

Just send a PR comment with @Checkmarx followed by a natural language request.

Examples: @Checkmarx how are you able to help me? @Checkmarx rescan this PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant