-
Notifications
You must be signed in to change notification settings - Fork 420
prism/5.14.3 package update #70128
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
prism/5.14.3 package update #70128
Conversation
octo-sts
bot
commented
Oct 28, 2025
Signed-off-by: wolfi-bot <[email protected]>
🩹 Build Failed: Patch Application Failed
Build Details
Root Cause Analysis 🔍The patch CVE-2025-1302.patch could not be applied to package.json because the target code at line 23 does not match what the patch expects. This typically occurs when the patch was created against a different version of the file, or the file has been modified since the patch was created. 🔍 Build failure fix suggestionsFound similar build failures that have been fixed in the past and analyzed them to suggest a fix: Similar PRs with fixesSuggested ChangesFile: prism.yaml
Replacement: Content:
Replacement: Content:
Content: File: CVE-2025-1302.patch
Content: Click to expand fix analysisAnalysisThe similar fixes show a consistent pattern: when patches fail to apply due to version mismatches, the solution is to update the package to a newer version where the CVE has already been fixed upstream, and remove the incompatible patch. In all three examples, the fix involved: 1) Bumping the package version to a newer release, 2) Updating the expected-commit hash to match the new version, 3) Removing the failing patch file entirely, and 4) Deleting the patch reference from the YAML configuration. This approach leverages Wolfi's principle of keeping packages up-to-date with upstream releases where security fixes are often already included. Click to expand fix explanationExplanationThis fix addresses the root cause by updating to a newer version where CVE-2025-1302 has likely been resolved upstream. The patch is failing because it was created for version 5.14.3, but the package.json structure has changed. Following the established pattern from similar fixes, updating to version 5.15.0 (or the latest available) should include the security fix natively. This approach aligns with Wolfi's principle of using the latest upstream versions and eliminates the need for manual patching. The expected-commit hash must be updated to match the new version tag to ensure build reproducibility. Click to expand alternative approachesAlternative Approaches
Was this comment helpful? Please use 👍 or 👎 reactions on this comment. |
Signed-off-by: Debasish Biswas <[email protected]>
b538abc to
b1fe88e
Compare
aborrero
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM.