-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): update dependency semantic-release to v19 [security] #21
base: master
Are you sure you want to change the base?
Conversation
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
45239e0
to
03d4083
Compare
03d4083
to
81c6110
Compare
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
81c6110
to
23b9908
Compare
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
23b9908
to
9a094f0
Compare
Kudos, SonarCloud Quality Gate passed! 0 Bugs No Coverage information |
9a094f0
to
6e28c64
Compare
6e28c64
to
192feea
Compare
Quality Gate passedIssues Measures |
192feea
to
fede7fd
Compare
fede7fd
to
4bb7fe7
Compare
4bb7fe7
to
9ff6e2e
Compare
9ff6e2e
to
aad749c
Compare
aad749c
to
5768750
Compare
Quality Gate passedIssues Measures |
a13e8df
to
6cbd603
Compare
6cbd603
to
525d9d4
Compare
525d9d4
to
ae3d7ad
Compare
ae3d7ad
to
410167b
Compare
Quality Gate passedIssues Measures |
410167b
to
f2ad8b4
Compare
f2ad8b4
to
7026473
Compare
Quality Gate passedIssues Measures |
This PR contains the following updates:
^17.4.2
->^19.0.0
GitHub Vulnerability Alerts
CVE-2022-31051
Impact
What kind of vulnerability is it? Who is impacted?
Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by encodeURI. Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials.
Patches
Has the problem been patched? What versions should users upgrade to?
Fixed in 19.0.3
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
Secrets that do not contain characters that are excluded from encoding with
encodeURI
when included in a URL are already masked properly.References
Are there any links users can visit to find out more?
For more information
If you have any questions or comments about this advisory:
Release Notes
semantic-release/semantic-release (semantic-release)
v19.0.3
Compare Source
Bug Fixes
v19.0.2
Compare Source
Bug Fixes
v19.0.1
Compare Source
Bug Fixes
v19.0.0
Compare Source
Bug Fixes
marked
to resolve ReDos vulnerability (#2330) (d9e5bc0)BREAKING CHANGES
@semantic-release/npm
has also dropped support for node v15marked
andmarked-terminal
that resolved the ReDoS vulnerability. removal of support of this node version should be low since it was not an LTS version and has been EOL for several months already.v18.0.1
Compare Source
Bug Fixes
v18.0.0
Compare Source
This is a maintenance release. An increasing amount of dependencies required a node version higher than the Node 10 version supported by
semantic-release@17
. We decided to go straight to a recent Node LTS version because the release build is usually independent of others, requiring a higher node version is less disruptive to users, but helps us reduce the maintenance overhead.If you use GitHub Actions and need to bump the node version set up by
actions/node-setup
, you can useoctoherd-script-bump-node-version-in-workflows
BREAKING CHANGES
node-version: the minimum required version of node is now v14.17
Configuration
📅 Schedule: Branch creation - "" in timezone Europe/Zurich, Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.