-
-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Npm Audit fails #2046
Comments
I also has the same issue: https://stackoverflow.com/questions/67423118/regular-expression-deinal-of-service-hosted-git-info |
Like most CVEs, this is a false positive, since the content comes from your own package.json. Either way, the place to file this issue is in |
This issue is actually in https://github.com/benmosher/eslint-plugin-import/blob/master/package.json#L113 Here's the dependency tree:
That dependency on |
@mgwalker that's not how the ecosystem works. The affected package is an implementation detail of normalize-package-data, which is an implementation detail of read-pkg, which is an implementation detail of read-pkg-up. Unfortunately, vulnerability warnings are breaking the abstraction here, but that still doesn't make it something we can fix. Most of these audit/security alerts are false positives; this is a sad reality of the incentives in the security ecosystem. In this case, the "vulnerability" would be that you'd have to have a package.json on your own machine, in your own code, that contained a malicious URL, and the damage caused would be no broader than "your linter would run forever, and CI would time out". It's a non-problem. If you can provide an alternative package (not |
I get it; I really do. And I won't belabor the point, but all of those things are also implementation details to the users of this library, and for all intents and purposes, this library is the source of this particular vulnerability for us. I sympathize with your position, though, supporting such a widely-used library across a broad platform base. And your point is well taken; there's no fix. |
@mgwalker i've just heard from npm folks that |
@ljharb Sorry, I didn't get this? |
@Sampath-Lokuge you should wait until the CVE is updated, and npm and github and other tools pick up the change, at which point the warning for those who have fully updated will vanish. This might take hours, or weeks, I have no idea. |
Usually it only takes hours. currently 2.8.9 is still marked as affected, let's see when this changes: https://www.npmjs.com/advisories/1677/versions |
2.8.9 is now marked as unaffected! I just got a PR from Dependabot silencing the alert. |
Moderate Regular Expression Deinal of Service
Package hosted-git-info
Patched in >=3.0.8
Dependency of eslint-plugin-import [dev]
Path eslint-plugin-import > read-pkg-up > read-pkg >
normalize-package-data > hosted-git-info
More info https://npmjs.com/advisories/1677
The text was updated successfully, but these errors were encountered: