[pull] main from modelcontextprotocol:main#318
Merged
Conversation
Bumps vulnerable Python deps via `uv lock --upgrade-package` across the three Python workspaces (src/git, src/fetch, src/time): High severity - gitpython 3.1.45 -> 3.1.49 (src/git): command injection via Git options bypass and unsafe `multi_options` validation (GHSA-x9j5-25mq-w6vh, GHSA-2gv7-q9w6-xfwm) - lxml 5.3.0 -> 6.1.0 (src/fetch): XXE in default iterparse() and ETCompatXMLParser() (GHSA-pjj9-h2g6-3v7q) - pyjwt 2.10.1 -> 2.12.1 (all): accepts unknown `crit` header extensions (GHSA-75c5-xw7c-p5pm) Medium / low - cryptography 46.0.5 -> 48.0.0 (all): buffer overflow with non-contiguous buffers; incomplete DNS name constraint enforcement - python-dotenv 1.0.1/1.2.1 -> 1.2.2 (all): symlink-following arbitrary file overwrite in set_key - python-multipart 0.0.22 -> 0.0.27 (all): DoS via large preamble/epilogue - pytest 8.3.x -> 9.0.3 (all): vulnerable tmpdir handling - pygments 2.19.2 -> 2.20.0 (src/fetch): ReDoS in GUID matcher - requests 2.32.4 -> 2.33.1 (src/fetch): insecure temp file reuse in extract_zipped_paths() All three workspaces sync cleanly and `uv run pytest` passes: - src/fetch: 20 passed - src/time: 38 passed - src/git: 41 passed (35 preexisting Windows-only fixture cleanup errors are reproducible on main and unrelated to this change) Supersedes/extends dependabot PR #3748 (which only bumped requests and cryptography to 46.0.6).
chore(deps): bump python deps to address security alerts
Bumps transitive npm dependencies via `npm audit fix` (no breaking changes): - @hono/node-server 1.19.9 -> 1.19.14 (auth bypass via encoded slashes; serveStatic bypass) - hono 4.11.7 -> 4.12.17 (multiple: serveStatic file access, cookie/SSE injection, IP matching, etc.) - express-rate-limit 8.2.1 -> 8.5.0 (IPv4-mapped IPv6 bypass) - path-to-regexp -> 8.4.2 (DoS via sequential optional groups / multi-wildcard ReDoS) - rollup 4.52.5 -> 4.60.3 (arbitrary file write via path traversal) - minimatch (3.x, 9.x, 10.x) -> patched (multiple ReDoS) - brace-expansion -> patched (zero-step DoS) - ajv 8.17.1 -> 8.20.0 (ReDoS in $data option) - qs 6.14.1 -> 6.15.1 (arrayLimit bypass DoS) - postcss 8.5.6 -> 8.5.14 (XSS in stringify output) Build and tests pass across all TS workspaces. Remaining 7 moderate dev-only alerts (vitest/vite/esbuild chain) require a major vitest 4.x bump and are out of scope here. Supersedes the contents of dependabot PR #3377 (minimatch 10.0.1 -> 10.2.1).
chore(deps): npm audit fix for high/medium security alerts
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
See Commits and Changes for more details.
Created by
pull[bot] (v2.0.0-alpha.4)
Can you help keep this open source service alive? 💖 Please sponsor : )