Closed renovate[bot] closed 1 year ago
Name | Link |
---|---|
Latest commit | 5739648392e2025258e3b92bbded22ea4db1c266 |
Latest deploy log | https://app.netlify.com/sites/walnut/deploys/63f77e93d139ca0008b8a610 |
Deploy Preview | https://deploy-preview-181--walnut.netlify.app |
Preview on mobile | Toggle QR Code...Use your smartphone camera to open QR code link. |
To edit notification comments on pull requests, go to your Netlify site settings.
This PR contains the following updates:
1.0.2
->1.0.33
GitHub Vulnerability Alerts
CVE-2022-25927
Description:
A regular expression denial of service (ReDoS) vulnerability has been discovered in
ua-parser-js
.Impact:
This vulnerability bypass the library's
MAX_LENGTH
input limit prevention. By crafting a very-very-long user-agent string with specific pattern, an attacker can turn the script to get stuck processing for a very long time which results in a denial of service (DoS) condition.Affected Versions:
All versions of the library prior to version
0.7.33
/1.0.33
.Patches:
A patch has been released to remove the vulnerable regular expression, update to version
0.7.33
/1.0.33
or later.References:
Regular expression Denial of Service - ReDoS
Credits:
Thanks to @Snyk who first reported the issue.
Configuration
π Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
π¦ Automerge: Disabled by config. Please merge this manually once you are satisfied.
β» Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
π Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.