-
-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Upgrade micromatch to avoid security vulnerability #6040
Comments
Isn't the security update within semver range? If so, simply installing Jest once again should solve the issue. |
The dependency is currently This is also why Snyk is reporting a vulnerability. Please correct if I'm wrong or I missed something. |
Oh, we need to update to micromatch 3 then |
Yes, sorry should have made that clearer. |
If I'm remembering right, both |
Correct, we're blocked on the bundling issue I've reported. We might want to switch out rollup if it unblocks us |
....and |
This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
[Feature request] Upgrade dependency
Jest including some of its sub-packages like
jest-message-utils
depend onmicromatch
version 2.3.11, which itself depends onbraces
version 1.8.5.That version of
braces
has a RegExp vulnerability. This causes Jest and some of its sub-packages to be reporter by vulnerabilities tools like Snyk.Upgrade all the packages that depend on
micromatch
to the latest version would solve that issue.The text was updated successfully, but these errors were encountered: