Replies: 2 comments 4 replies
-
Which package are you seeing the vulnerability for? Usually anything in the extensions directory is a false positive (see #6332). The extensions have names that collide with npm packages, so the tools think they are vulnerable, but really they are unrelated. |
Beta Was this translation helpful? Give feedback.
-
Deleting the entire extension folder is not helpful. So I have deleted all the affected packages.json file from the extension folder. That was I was able to remove most of all but 1. There is on more CVE that couldn't fix - CVE-2025-47269 Currently I am using latest code-server 1.104.0 In the report it is pointing to below path I tried deleting that package.json 😂 , it has started throwing so many warnings afterwards.. It should not be deleted.. Please suggest something on this last CVE |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi Team,
We are using this code server extension in our docker container with below steps to install in container.
Downloading from release -linux-arm64 version
Extracting the tar and coping code-server folder into /use/bin/
And we have added command in supervisor.conf to run code-server with port and host
To summarize above steps I am following standalone release section from install page.
Recently we are receiving vulnerability related to npm and when I checked it is showing version 1.0.1 installed. Which is there inside the extension/package.json file.. as we are extracting the deployed tar file vulnerability is getting popped up from code-server folder. Now I am not sure how to get the latest version there in the deployed file.
Please can someone suggest anything? Or is there any other approach that I should follow?
Beta Was this translation helpful? Give feedback.
All reactions