-
-
Notifications
You must be signed in to change notification settings - Fork 185
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[CVE-2022-37603]/ReDoS found in interpolateName.js #213
Comments
Please migrate to |
same problem in version 3.2.0 |
@JSMike @alexander-akait |
PR #217 doesn't fix this vulnerability. It's for CVE-2022-37601. |
#225 fixes as well this issue for the 2.0.x version? |
Yes, backported to all versions (except |
Thanks for the confirmation!
|
How can I change the version? |
Just update transitive deps - |
A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js.
The prototype pollution vulnerability can be mitigated with several best practices described here: https://learn.snyk.io/lessons/prototype-pollution/javascript/
The text was updated successfully, but these errors were encountered: