-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump path-to-regexp on 1.x branch to resolve CVE-2024-45296 #885
Comments
The new version is not 100% backwards compatible in some edge cases and we have evaluated that the impact of the vulnerability is quite small due to the way we're not using that library on the server. For this reason, we're planning to create a new 2.0 branch and take that into use starting from the upcoming Vaadin 24.5 release while keeping the current version for older Vaadin versions to preserve backwards compatibility. |
Would like to see this as well, as for our company provisions we have to fix the CVE |
Also same here. We use Vaadin router in a few applications in our company and it is causing us to be noncompliant |
Thanks for all your feedbacks. |
Hi - we also have to remediate this issue. It would be great to get the rc out. Is there anything we can do to help? |
Hi all, Thanks for your patience. the |
@ZheSun88 awesome, is there an changelog anywhere available? |
@ZheSun88 are there any plans to go, to a not releaseCandidate version soon? |
Would it be possible to bump path-to-regexp to a more recent version that contains the fixes for CVE-2024-45296. The current dependency on 2.4.0 is causing our application to be flagged by our customer's security scanning tools.
See GHSA-9wv6-86v2-598j for details.
The text was updated successfully, but these errors were encountered: