-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Severe vulnerability in ts-config paths version that is required #2632
Comments
For anyone having this issue, for now, you can use overrides in your package.json. e.g.
or whatever the dependency chain is in your project to the json5 requirement as that update is a minor semver from 2.2.1 to 2.2.2 |
json5 v1.0.2 has already been updated with this fix, and either way, it's not a valid vulnerability. As is the case with almost every JS CVE, the best course of action is to do nothing until the ecosystem fixes it for you. This is a duplicate of #2625; a duplicate of #2628; a duplicate of #2626; a duplicate of #2627; a duplicate of #2631. Please stop filing issues about a vulnerability on "not the vulnerable package", it doesn't help. |
Apologies for the duplicate. And believed it was relevant due to the dependency of an older version of tsconfig-paths which is relevant to this package, where being able to update that dependency I thought would have been a valid proposition. |
Unfortunately it'd be a breaking change to upgrade tsconfig-paths, and #2447 is open for that, if we ever are doing a semver-major. |
A new severe vulnerability has been found in json5 < 2.2.2
The version os tsconfig-paths that this plugin uses needs updating. 4.1.1 is the latest release which will update json5 to the latest version too. But this package requires 3.14.1
Is there any change of an update ASAP please?
This package is being used by a NuxtJS eslint config plugin I am using and should there be breaking changes or a major semver release as a result I will raise an issue there to get that updated too.
I'll raise an issue there so the maintainers can track this vulnerability.
This is my npm audit report:
The text was updated successfully, but these errors were encountered: