fix: upgrade hono to ^4.12.18 to address CVE-2026-44456#1187
fix: upgrade hono to ^4.12.18 to address CVE-2026-44456#1187brendan-kellam wants to merge 2 commits intomainfrom
Conversation
Co-authored-by: Brendan Kellam <brendan@sourcebot.dev>
|
Important Review skippedDraft detected. Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Co-authored-by: Brendan Kellam <brendan@sourcebot.dev>
License Audit
Weak Copyleft Packages (informational)
Resolved Packages (11)
|
|
Closing as duplicate — consolidated into #1186, which addresses all four sibling hono CVEs (44455–44458) with the same 4.12.14 → 4.12.18 bump. |
Fixes SOU-1069
Summary
Updated the
honopackage resolution from^4.12.14to^4.12.18to address CVE-2026-44456, a bodyLimit() bypass vulnerability for chunked/unknown-length requests.Details
honov4.12.14 (transitive dependency via@modelcontextprotocol/sdk)honov4.12.18bodyLimit()does not reliably enforcemaxSizefor requests without a usableContent-Lengthheader (e.g.,Transfer-Encoding: chunked), allowing oversized requests to bypass the limit and reach handler logicChanges
@modelcontextprotocol/sdk/honoresolution inpackage.jsonfrom^4.12.14to^4.12.18yarn.lockto apply the resolutionTesting
yarn why hono --recursiveLinear Issue: SOU-1069