Skip to content

Accept GHSA-w5hq-g745-h8pq (uuid <11.1.1) advisory#395

Merged
TwitchBronBron merged 1 commit into
masterfrom
task/audit-ci-uuid-allowlist
May 22, 2026
Merged

Accept GHSA-w5hq-g745-h8pq (uuid <11.1.1) advisory#395
TwitchBronBron merged 1 commit into
masterfrom
task/audit-ci-uuid-allowlist

Conversation

@chrisdp
Copy link
Copy Markdown
Collaborator

@chrisdp chrisdp commented May 22, 2026

Summary

  • Adds GHSA-w5hq-g745-h8pq (uuid <11.1.1, missing buffer bounds check in v3()/v5()/v6()) to the audit-ci allowlist.
  • Sets up audit-ci config and wires the audit script through it.
  • Adds an Accepted security advisories section to the README.

Why it's safe to defer

The vulnerable code path is v3()/v5()/v6() when a caller-provided output buffer is passed. Every consumer in this dep graph (postman-request, dev-only nyc>istanbul-lib-processinfo) calls only v4() with no buffer arg, so the vulnerable path is unreachable. See audit-ci.jsonc for the exact reasoning.

Adds GHSA-w5hq-g745-h8pq to the audit-ci allowlist. The vulnerable code
path is `v3()`/`v5()`/`v6()` when a caller-provided buffer is passed.
Every consumer in this dep graph (`postman-request`, dev-only
`nyc>istanbul-lib-processinfo`) calls only `v4()` with no buffer arg,
so the vulnerable path is unreachable.

Sets up `audit-ci` (config + script wiring) and adds an
`Accepted security advisories` section to the README.
@TwitchBronBron TwitchBronBron merged commit dc04ae6 into master May 22, 2026
8 checks passed
@TwitchBronBron TwitchBronBron deleted the task/audit-ci-uuid-allowlist branch May 22, 2026 20:35
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants