chore(deps): bump es5-ext in /packages/cubejs-query-orchestrator to address security advisory #7884
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
I was running into this security alert in my project due to the pinned version in this package.
es5-ext vulnerable to Regular Expression Denial of Service in
function#copy
andfunction#toStringTokens
Impact
Passing functions with very long names or complex default argument names into function#copy orfunction#toStringTokens may put script to stall
Patches
Fixed with medikoo/es5-ext@3551cdd and medikoo/es5-ext@a52e957
Published with v0.10.63
Workarounds
No real workaround aside of refraining from using above utilities.
References
medikoo/es5-ext#201
References
GHSA-4gmj-3p3h-gm8h
https://nvd.nist.gov/vuln/detail/CVE-2024-27088
medikoo/es5-ext#201
medikoo/es5-ext@3551cdd
medikoo/es5-ext@a52e957