-
Notifications
You must be signed in to change notification settings - Fork 111
Update brace-expansion dependency to version 2.0.2 in yarn.lock #537
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't understand the point. yarn.lock
, the way I understand this, is what we will download when working with the library, but it's not what our users will see. Am I mistaken?
Also, are our users actually somehow affected by the problem solved in this update? How can one trigger this? If this doesn't affect anyone, why not just keep the default?
The CVE behind Dependabot’s alert (CVE‑2025‑5889) is a regular‑expression DoS in the library’s Do our end‑users call Keeping the lock file on a safe version serves three goals: it removes an avoidable availability risk in our own build pipeline, it silences automated vulnerability scanners that consumers run on the published artefacts, and it ensures that future refactors that do expose brace expansion cannot silently re‑introduce the CVE. The change is non‑functional and backward‑compatible, so the safest default is to update now and carry on. |
If the vulnerable code is delivered (how?), just updating
What risk do you mean? We don't accept untrusted inputs during our builds. The build either passes everywhere or fails everywhere, there should be no variability between builds depending on the environment.
Do published artifacts actually expose this internal
We do not use this library in our Kotlin/JS implementation directly, so I struggle to imagine what refactorings could expose this issue. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The reason I'm opposed to making this change without a good reason is the first line in this file. It's autogenerated, and if there isn't a valid concern that makes that problematic, it's more straightforward to keep allowing the compiler to manage it. If there is a valid concern, then it is also a problem that probably affects others, not just us, and then we should report it.
My main motivation for making this change was to avoid introducing any potential vulnerabilities, even the most minimal ones. I thought it was possible that some bank would decide to use our library, but then their security team would come along, look at our I think it is safe to make such an update, since the regexp change is the only change in 2.0.2 compared to 2.0.1. Yes, you are right about the comment about automatically changing
In the kotlin-js-store/yarn.lock file, I replaced the line
Also, as I see, |
@DmitryNekrasov, the thing is, I don't know if we should close the issue, I haven't looked into it. If there truly is a potential security vulnerability, we should fix it instead of closing it, of course. If there is no security vulnerability, then there is not much point to taking on the burden of maintaining |
IIUC, the connection between |
Thanks for the research! In that case, this does not look like a |
No description provided.