Skip to content

[Aikido] Fix security issue in uuid via major version upgrade from 8.3.2 to 11.1.1#4

Open
aikido-autofix[bot] wants to merge 1 commit into
mainfrom
fix/AIK-13945-update-packages-38419857-snwj
Open

[Aikido] Fix security issue in uuid via major version upgrade from 8.3.2 to 11.1.1#4
aikido-autofix[bot] wants to merge 1 commit into
mainfrom
fix/AIK-13945-update-packages-38419857-snwj

Conversation

@aikido-autofix
Copy link
Copy Markdown

@aikido-autofix aikido-autofix Bot commented May 22, 2026

Upgrade uuid to fix buffer overflow vulnerabilities in v3, v5, and v6 functions that could write past buffer boundaries.

✅ Code not affected by breaking changes.

✅ The uuid npm package is not used in this codebase. After thorough analysis:

  1. No direct dependency: The package.json does not list uuid as a dependency

  2. No transitive dependency: The current package-lock.json does not contain uuid at all. While @actions/core is a dependency, the version used (1.11.1) does not depend on uuid

  3. No code usage: No imports or usage of uuid functions (v1, v3, v4, v5, v6, v7) were found in the source code

  4. Context clarification: The only references to "uuid" in the codebase are in src/scripts/tools/add_tools.sh and src/extensions.ts, where they refer to the PHP uuid extension, not the npm package

Since the uuid npm package is not used in this codebase, none of the breaking changes in versions 9.0.0, 10.0.0, or 11.0.0 affect this project.

All breaking changes by upgrading uuid from version 8.3.2 to 11.1.1 (CHANGELOG)

Version Description
9.0.0
Drop Node.js 10.x support
9.0.0
Remove the minified UMD build from the package
9.0.0
Drop IE 11 and Safari 10 support, remove msCrypto fallback, and no longer transpile browser build to ES2015
10.0.0
Drop Node.js 12 and 14 support, add Node.js 20 (update node support matrix to only support node 16-20)
11.0.0
Refactor v1 internal state and options logic
11.0.0
Refactor v7 internal state and options logic
11.0.0
Port to TypeScript
11.0.0
Update node support matrix (only support node 16-20)
✅ 2 CVEs resolved by this upgrade

This PR will resolve the following CVEs:

Issue Severity           Description
CVE-2026-41907
MEDIUM
[uuid] A buffer overflow vulnerability allows v3, v5, and v6 UUID functions to write beyond caller-provided buffer boundaries when given small buffers or large offsets, causing silent data corruption. This can lead to memory corruption and potential code execution or information disclosure.
AIKIDO-2026-10892
MEDIUM
[uuid] UUID functions v3(), v5(), and v6() can write past the end of a caller-provided buffer due to missing offset validation, enabling buffer overflow attacks. The fix adds bounds checks to prevent out-of-range writes.
🔗 Related Tasks
🤖 Remediation details

Fix transitive uuid vulnerability by bumping @actions/core

Short summary

This PR remediates a vulnerability in the transitive dependency uuid (CVE-2026-41907, AIKIDO-2026-10892). uuid was pulled into the project as a dependency of @actions/core and resolved to the vulnerable version 8.3.2. The fix updates the declared spec for @actions/core in the root package.json and refreshes package-lock.json so that uuid is no longer present in the dependency tree.

uuid

[email protected] was a transitive dependency introduced by @actions/[email protected] and is vulnerable across the [0.0.1, 10.0.0] range (AIKIDO-2026-10892) as well as requiring a patch to >=11.1.1 (CVE-2026-41907). Rather than overriding uuid directly, the fix bumps @actions/core to ^1.11.0 in the root package.json, because @actions/[email protected] is the first release that drops the uuid dependency entirely. After running npm install --package-lock-only, @actions/core resolved to 1.11.1 and uuid has zero remaining instances in the lockfile.

Version changes

Package From To Why updated
@actions/core ^1.10.1 (resolved 1.10.1) ^1.11.0 (resolved 1.11.1) Parent bump required to drop transitive uuid vulnerability
uuid 8.3.2 (removed) Transitive CVE fix — eliminated after parent bump of @actions/core

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants