You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Older versions of Mithril have a high severity security vulnerability due to a prototype pollution during query string parsing (npm advisory published 5 days ago)
I propose that the same fix as #2494 be applied to the v1 branch, and a new version v1.1.7 be released.
Are there any blockers to doing this, or reasons to not do it?
The text was updated successfully, but these errors were encountered:
A PR would be appreciated, and then I'll cut a special release for it. The fix would be virtually copy/paste. (Read the comments in querystring/parse.js to know what precisely to copy over.) There are also tests that need copied over, too.
Be sure to check out and file the PR against v1_1_x and not next (as the contributing docs say), so it ends up in the right branch.
Are there any blockers to doing this, or reasons to not do it?
There's no real blockers per se, just it's a bit more involved to release because I also have to update the v2 docs at the same time. (It's not exactly streamlined in that respect.) And because of the circumstances, I'll also need to notify npm they need to update their advisory in light of the new version. To be fair, this is the first time any vulnerability has been disclosed in Mithril, so there's not any real pre-established process to this.
I do want to note: anything other than security fixes would be a no-go for v1.
Mithril version:
1.1.6
Browser and OS:
Any
Context
Given that
I think the fix should be ported back to v1.1.6
Proposal
I propose that the same fix as #2494 be applied to the v1 branch, and a new version v1.1.7 be released.
Are there any blockers to doing this, or reasons to not do it?
The text was updated successfully, but these errors were encountered: