-
-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Bump kind-of version for CVE-2019-20149 #18
Conversation
Thanks for the PR, but this isn't necessary right now. |
@doowb sounds good. However, I think as long as 6.0.2 is mentioned in the package.json this will be reported as an issue using security scan tools. For example, a report using Whitesource from today continues to flag clone-deep as using kind-of v6.0.2, even with 6.0.3 available However, weirdly enough the vulnerability is no longer found in the whitesource vulnerabilities list so perhaps the report issue will go away soon as well https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20149/ |
Yeah but that’s really a failing of those tools and an encumbrance on maintainers, isn’t it?
…Sent from my iPhone
On Jan 23, 2020, at 5:52 AM, Adelya Fatykhova ***@***.***> wrote:
@doowb sounds good. However, I think as long as 6.0.2 is mentioned in the package.json this will be reported as an issue using security scan tools.
For example, the report using Whitesource continues to flag clone-deep as using kind-of v6.0.2, even with 6.0.3 available
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
This isn't how semver ranges work, and it isn't a failing of those tools; the tools are correct.
|
Closing based on age and since this is 100% the responsibility and/or failing of the package manager. |
Description
Due to CVE-2019-20149, a new version of kind-of has been released.
Since clone-deep uses 6.0.2, this raises security flags.
FYI @jonschlinkert @doowb could you take care of this and release a new version of this package?