Skip to content

Fix security issue in undici via major version upgrade from 5.29.0 to 6.15.0#584

Closed
aikido-autofix[bot] wants to merge 1 commit intomainfrom
fix/aikido-security-update-packages-3828006-nAMs
Closed

Fix security issue in undici via major version upgrade from 5.29.0 to 6.15.0#584
aikido-autofix[bot] wants to merge 1 commit intomainfrom
fix/aikido-security-update-packages-3828006-nAMs

Conversation

@aikido-autofix
Copy link
Contributor

This PR will resolve the following CVEs:

CVE ID Severity Description
AIKIDO-2024-10065
MEDIUM
Affected versions of the undici library are vulnerable to memory leaks. By making multiple fetch requests with the same AbortSignal, undici adds event listeners without removing them, leading to excessive memory consumption.
AIKIDO-2025-10024
MEDIUM
Affected versions of the undici library are vulnerable because they use insufficiently random values generated by Math.random() when encoding form-data in the body. Since Math.random() produces low-entropy and predictable values, attackers could potentially exploit this flaw to manipulate or a...

@codecov
Copy link

codecov bot commented Apr 17, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

📢 Thoughts on this report? Let us know!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant