Open renovate[bot] opened 3 years ago
Renovate failed to update an artifact related to this branch. You probably do not want to merge this PR as-is.
:recycle: Renovate will retry this branch, including artifacts, only when one of the following happens:
The artifact failure details are included below:
npm WARN checkPermissions Missing write access to /mnt/renovate/gh/Unibeautify/auto-config/node_modules/@unibeautify/beautifier-file
npm WARN @unibeautify/beautifier-eslint@0.5.0 requires a peer of eslint@^4.19.1 but none is installed. You must install peer dependencies yourself.
npm WARN ajv-keywords@3.2.0 requires a peer of ajv@^6.0.0 but none is installed. You must install peer dependencies yourself.
npm ERR! code ENOENT
npm ERR! syscall access
npm ERR! path /mnt/renovate/gh/Unibeautify/auto-config/node_modules/@unibeautify/beautifier-file
npm ERR! errno -2
npm ERR! enoent ENOENT: no such file or directory, access '/mnt/renovate/gh/Unibeautify/auto-config/node_modules/@unibeautify/beautifier-file'
npm ERR! enoent This is related to npm not being able to find a file.
npm ERR! enoent
npm ERR! A complete log of this run can be found in:
npm ERR! /tmp/renovate-cache/others/npm/_logs/2021-04-26T17_26_12_111Z-debug.log
This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.
This PR contains the following updates:
3.12.0
->3.13.1
GitHub Vulnerability Alerts
GHSA-8j8c-7jfh-h6hx
Versions of
js-yaml
prior to 3.13.1 are vulnerable to Code Injection. Theload()
function may execute arbitrary code injected through a malicious YAML file. Objects that havetoString
as key, JavaScript code as value and are used as explicit mapping keys allow attackers to execute the supplied code through theload()
function. ThesafeLoad()
function is unaffected.An example payload is
{ toString: !<tag:yaml.org,2002:js/function> 'function (){return Date.now()}' } : 1
which returns the object { "1553107949161": 1 }Recommendation
Upgrade to version 3.13.1.
GHSA-2pr6-76vf-7546
Versions of
js-yaml
prior to 3.13.0 are vulnerable to Denial of Service. By parsing a carefully-crafted YAML file, the node process stalls and may exhaust system resources leading to a Denial of Service.Recommendation
Upgrade to version 3.13.0.
Configuration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.