-
-
Notifications
You must be signed in to change notification settings - Fork 236
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
npm audit fix prompts me to downgrade to Concurrently@3 #274
Comments
Hi @adamnovak! |
@gustavohenke If I found where the read-pkg was used it looks like it is in one place https://github.com/kimmobrunfeldt/concurrently/blob/70b92daadd262c855e1e2928d13007a2b7009661/src/command-parser/expand-npm-wildcard.js#L20 where the |
Possibly, but I'd like to check why it was introduced in the first place. But to be fair, Node 10 reached EOL -- it's no longer in maintenance mode according to https://nodejs.org/en/about/releases/. |
Hey all. |
Someone discovered today that
hosted-git-info
, used bynormalize-package-data
, used byread-pkg
, used byconcurrently
, had a polynomial-time regex implementation. This constitutes a medium-severity security vulnerability (I guess if you feed it an untrusted regex?), and hence the tooling has decided it wants to downgrade me to a version of Concurrently from before it depended on any of the affected modules.Can the Concurrently team go bother people further down the dependency chain to update? Or else somehow inform
npm audit
that this vulnerability does not actually exist in the context of concurrently because no untrusted regexes are involved?The text was updated successfully, but these errors were encountered: