-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security vulnerability caused by jws@3.1.4 #465
Comments
@ziluvatar FYA A simple deps update should not take 6 days |
@kyrylkov the upgrade is already in this PR: #466 Keep in mind our package.json definition allows JWS patch upgrades, you should be able to get the new JWS release right away. I want to take a look to the fix from JWS first, I took a fast look yesterday and I'm not sure if the decoding works fine, but I want to do some checks before setting that version as default here, anyway, as I said, you could get it. |
You are correct. Somehow a few days ago (after |
v8.2.2 released with this fixed. Thank you all! |
In our project, Snyk reported
jws@3.1.4
as a dependency with a known security vulnerability, because it depends onjwa@1.1.5
.The latest version of
jws
(3.1.5), no longer depends on the vulnerable dependency ofbase64url@2.0.0
.More info about the high severity vulnerability in
jws@3.1.4
can be found at https://snyk.io/vuln/npm:base64url:20180511The text was updated successfully, but these errors were encountered: