[ 
https://issues.apache.org/jira/browse/YUNIKORN-3268?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Wilfred Spiegelenburg resolved YUNIKORN-3268.
---------------------------------------------
    Fix Version/s: 1.9.0
       Resolution: Fixed

The CVE list might have changed slightly after the removal of karma for the 
tests but all open dependabot issue have been remediated.

A clear slate, for as long as it lasts, for dependency introduced CVEs, even in 
development builds.

> WEB UI: Update dependencies for CVE fixes
> -----------------------------------------
>
>                 Key: YUNIKORN-3268
>                 URL: https://issues.apache.org/jira/browse/YUNIKORN-3268
>             Project: Apache YuniKorn
>          Issue Type: Improvement
>          Components: security, webapp
>            Reporter: Wilfred Spiegelenburg
>            Assignee: Wilfred Spiegelenburg
>            Priority: Major
>              Labels: pull-request-available
>             Fix For: 1.9.0
>
>
> Another set of CVE upgrades that cannot be applied by dependabot:
>   CVE-2026-41324: basic-ftp vulnerable to denial of service via unbounded 
> memory consumption in Client.list()
>   GHSA-458j-xx4x-4375: hono Improperly Handles JSX Attribute Names Allows 
> HTML Injection in hono/jsx SSR
>   GHSA-r4q5-vmmm-2653: follow-redirects leaks Custom Authentication Headers 
> to Cross-Domain Redirect Targets
>   GHSA-6v7q-wjvx-w8wg: basic-ftp: Incomplete CRLF Injection Protection Allows 
> Arbitrary FTP Command Execution via Credentials and MKD Commands
>   CVE-2026-2950: lodash vulnerable to Prototype Pollution via array path 
> bypass in `_.unset` and `_.omit`
>   CVE-2026-4800: lodash vulnerable to Code Injection via `_.template` imports 
> key names
>   CVE-2026-39983: basic-ftp has FTP Command Injection via CRLF
>   CVE-2026-39410: Hono: Non-breaking space prefix bypass in cookie name 
> handling in getCookie()
>   GHSA-26pp-8wgv-hjvm: Hono missing validation of cookie name on write path 
> in setCookie()
>   CVE-2026-39409: Hono has incorrect IP matching in ipRestriction() for 
> IPv4-mapped IPv6 addresses
>   CVE-2026-39407: Hono: Middleware bypass via repeated slashes in serveStatic
>   CVE-2026-39408: Hono: Path traversal in toSSG() allows writing files 
> outside the output directory
>   CVE-2026-39406: @hono/node-server: Middleware bypass via repeated slashes 
> in serveStatic
>   CVE-2026-39365: Vite Vulnerable to Path Traversal in Optimized Deps `.map` 
> Handling
>   CVE-2026-39363: Vite Vulnerable to Arbitrary File Read via Vite Dev Server 
> WebSocket
>   CVE-2026-39364: Vite: `server.fs.deny` bypassed with queries
>   CVE-2026-4867: path-to-regexp vulnerable to Regular Expression Denial of 
> Service via multiple route parameters
>   CVE-2026-4926: path-to-regexp vulnerable to Denial of Service via 
> sequential optional groups
>   CVE-2026-4923: path-to-regexp vulnerable to Regular Expression Denial of 
> Service via multiple wildcards
>   CVE-2026-33750: brace-expansion: Zero-step sequence causes process hang and 
> memory exhaustion
>   CVE-2026-33532: yaml is vulnerable to Stack Overflow via deeply nested YAML 
> collections
>   CVE-2026-33672: Picomatch: Method Injection in POSIX Character Classes 
> causes incorrect Glob Matching
>   CVE-2026-33671: Picomatch has a ReDoS vulnerability via extglob quantifiers
>   CVE-2026-33228: Prototype Pollution via parse() in NodeJS flatted
>   CVE-2026-33151: socket.io allows an unbounded number of binary attachments
>   CVE-2026-32141: flatted vulnerable to unbounded recursion DoS in parse() 
> revive phase
>   CVE-2026-32635: Angular vulnerable to XSS in i18n attribute bindings



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to