fix(deps): update dependency hono to v4.9.7 [security] #3880
No reviewers
Labels
No labels
awaiting-reply
breaking changes
bug
cannot-reproduce
dependencies
documentation
duplicate
electron-issue
enhancement
fix-available
good first issue
help wanted
invalid
javascript
need more information
need rebase
official-youtube-music-issue
plugin request
question
release
security
stale
Status: blocked
typo
wontfix
ytmd-issue
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: YTMD/youtube-music#3880
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "renovate/npm-hono-vulnerability"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Coming soon: The Renovate bot (GitHub App) will be renamed to Mend. PRs from Renovate will soon appear from 'Mend'. Learn more here.
This PR contains the following updates:
4.9.6
->4.9.7
GitHub Vulnerability Alerts
CVE-2025-59139
Summary
A flaw in the
bodyLimit
middleware could allow bypassing the configured request body size limit when conflicting HTTP headers were present.Details
The middleware previously prioritized the
Content-Length
header even when aTransfer-Encoding: chunked
header was also included. According to the HTTP specification,Content-Length
must be ignored in such cases. This discrepancy could allow oversized request bodies to bypass the configured limit.Most standards-compliant runtimes and reverse proxies may reject such malformed requests with
400 Bad Request
, so the practical impact depends on the runtime and deployment environment.Impact
If body size limits are used as a safeguard against large or malicious requests, this flaw could allow attackers to send oversized request bodies. The primary risk is denial of service (DoS) due to excessive memory or CPU consumption when handling very large requests.
Resolution
The implementation has been updated to align with the HTTP specification, ensuring that
Transfer-Encoding
takes precedence overContent-Length
. The issue is fixed in Hono v4.9.7, and all users should upgrade immediately.Release Notes
honojs/hono (hono)
v4.9.7
Compare Source
Security
bodyLimit
middleware where the body size limit could be bypassed when bothContent-Length
andTransfer-Encoding
headers were present. If you are using this middleware, please update immediately. Security AdvisoryWhat's Changed
parseResponse
not parsing json in react native by @lr0pb in #4399.tool-versions
file by @3w36zj6 in #4397bun install
commands to use--frozen-lockfile
by @3w36zj6 in #4398New Contributors
Full Changelog: https://github.com/honojs/hono/compare/v4.9.6...v4.9.7
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.
View command line instructions
Checkout
From your project repository, check out a new branch and test the changes.Merge
Merge the changes and update on Forgejo.Warning: The "Autodetect manual merge" setting is not enabled for this repository, you will have to mark this pull request as manually merged afterwards.