Bump the npm_and_yarn group with 3 updates
Bumps the npm_and_yarn group with 3 updates: karma, socket.io-parser and ws.
Updates karma from 5.2.3 to 6.3.16
Release notes
Sourced from karma's releases.
v6.3.16
6.3.16 (2022-02-10)
Bug Fixes
- security: mitigate the "Open Redirect Vulnerability" (ff7edbb)
v6.3.15
6.3.15 (2022-02-05)
Bug Fixes
- helper: make mkdirIfNotExists helper resilient to concurrent calls (d9dade2), closes karma-runner/karma-coverage#434
v6.3.14
6.3.14 (2022-02-05)
Bug Fixes
- remove string template from client code (91d5acd)
- warn when
singleRunandautoWatcharefalse(69cfc76)- security: remove XSS vulnerability in
returnUrlquery param (839578c)v6.3.13
6.3.13 (2022-01-31)
Bug Fixes
v6.3.12
6.3.12 (2022-01-24)
Bug Fixes
- remove depreciation warning from log4js (41bed33)
v6.3.11
6.3.11 (2022-01-13)
Bug Fixes
- deps: pin colors package to 1.4.0 due to security vulnerability (a5219c5)
... (truncated)
Changelog
Sourced from karma's changelog.
6.3.16 (2022-02-10)
Bug Fixes
- security: mitigate the "Open Redirect Vulnerability" (ff7edbb)
6.3.15 (2022-02-05)
Bug Fixes
- helper: make mkdirIfNotExists helper resilient to concurrent calls (d9dade2), closes karma-runner/karma-coverage#434
6.3.14 (2022-02-05)
Bug Fixes
- remove string template from client code (91d5acd)
- warn when
singleRunandautoWatcharefalse(69cfc76)- security: remove XSS vulnerability in
returnUrlquery param (839578c)6.3.13 (2022-01-31)
Bug Fixes
6.3.12 (2022-01-24)
Bug Fixes
- remove depreciation warning from log4js (41bed33)
6.3.11 (2022-01-13)
Bug Fixes
- deps: pin colors package to 1.4.0 due to security vulnerability (a5219c5)
6.3.10 (2022-01-08)
Bug Fixes
... (truncated)
Commits
ab4b328chore(release): 6.3.16 [skip ci]ff7edbbfix(security): mitigate the "Open Redirect Vulnerability"c1befa0chore(release): 6.3.15 [skip ci]d9dade2fix(helper): make mkdirIfNotExists helper resilient to concurrent calls653c762ci: prevent duplicate CI tasks on creating a PRc97e562chore(release): 6.3.14 [skip ci]91d5acdfix: remove string template from client code69cfc76fix: warn whensingleRunandautoWatcharefalse839578cfix(security): remove XSS vulnerability inreturnUrlquery paramdb53785chore(release): 6.3.13 [skip ci]- Additional commits viewable in compare view
Updates socket.io-parser from 3.3.3 to 4.2.4
Release notes
Sourced from socket.io-parser's releases.
4.2.4
Bug Fixes
- ensure reserved events cannot be used as event names (d9db473)
- properly detect plain objects (b0e6400)
Links
4.2.3
:warning: This release contains an important security fix :warning:
A malicious client could send a specially crafted HTTP request, triggering an uncaught exception and killing the Node.js process:
TypeError: Cannot convert object to primitive value at Socket.emit (node:events:507:25) at .../node_modules/socket.io/lib/socket.js:531:14Please upgrade as soon as possible.
Bug Fixes
- check the format of the event name (3b78117)
Links
4.2.2
Bug Fixes
- calling destroy() should clear all internal state (22c42e3)
- do not modify the input packet upon encoding (ae8dd88)
Links
4.2.1
Bug Fixes
- check the format of the index of each attachment (b5d0cb7)
Links
... (truncated)
Changelog
Sourced from socket.io-parser's changelog.
4.2.4 (2023-05-31)
Bug Fixes
- ensure reserved events cannot be used as event names (d9db473)
- properly detect plain objects (b0e6400)
3.4.3 (2023-05-22)
Bug Fixes
- check the format of the event name (2dc3c92)
4.2.3 (2023-05-22)
Bug Fixes
- check the format of the event name (3b78117)
4.2.2 (2023-01-19)
Bug Fixes
Commits
164ba2achore(release): 4.2.4b0e6400fix: properly detect plain objectsd9db473fix: ensure reserved events cannot be used as event names6a5a004docs(changelog): include changelog for release 3.4.3b6c824fchore(release): 4.2.3dcc70d9refactor: export typescript declarations for the commonjs build3b78117fix: check the format of the event name0841bd5chore: bump ua-parser-js from 1.0.32 to 1.0.33 (#121)28dd668chore(release): 4.2.222c42e3fix: calling destroy() should clear all internal state- Additional commits viewable in compare view
Updates ws from 7.4.6 to 8.17.1
Release notes
Sourced from ws's releases.
8.17.1
Bug fixes
- Fixed a DoS vulnerability (#2231).
A request with a number of headers exceeding the[
server.maxHeadersCount][] threshold could be used to crash a ws server.const http = require('http'); const WebSocket = require('ws');const wss = new WebSocket.Server({ port: 0 }, function () { const chars = "!#$%&'*+-.0123456789abcdefghijklmnopqrstuvwxyz^_`|~".split(''); const headers = {}; let count = 0;
for (let i = 0; i < chars.length; i++) { if (count === 2000) break;
for (let j = 0; j < chars.length; j++) { const key = chars[i] + chars[j]; headers[key] = 'x';if (++count === 2000) break; }
}
headers.Connection = 'Upgrade'; headers.Upgrade = 'websocket'; headers['Sec-WebSocket-Key'] = 'dGhlIHNhbXBsZSBub25jZQ=='; headers['Sec-WebSocket-Version'] = '13';
const request = http.request({ headers: headers, host: '127.0.0.1', port: wss.address().port });
request.end(); });
The vulnerability was reported by Ryan LaPointe in websockets/ws#2230.
In vulnerable versions of ws, the issue can be mitigated in the following ways:
- Reduce the maximum allowed length of the request headers using the [
--max-http-header-size=size][] and/or the [maxHeaderSize][] options so that no more headers than theserver.maxHeadersCountlimit can be sent.
... (truncated)
Commits
3c56601[dist] 8.17.1e55e510[security] Fix crash when the Upgrade header cannot be read (#2231)6a00029[test] Increase code coverageddfe4a8[perf] Reduce the amount ofcrypto.randomFillSync()callsb73b118[dist] 8.17.029694a5[test] Use thehighWaterMarkvariable934c9d6[ci] Test on node 221817bac[ci] Do not test on node 2196c9b3d[major] Flip the default value ofallowSynchronousEvents(#2221)e5f32c7[fix] Emit at most one event per event loop iteration (#2218)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
-
@dependabot rebasewill rebase this PR -
@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it -
@dependabot mergewill merge this PR after your CI passes on it -
@dependabot squash and mergewill squash and merge this PR after your CI passes on it -
@dependabot cancel mergewill cancel a previously requested merge and block automerging -
@dependabot reopenwill reopen this PR if it is closed -
@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually -
@dependabot show <dependency name> ignore conditionswill show all of the ignore conditions of the specified dependency -
@dependabot ignore <dependency name> major versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's major version (unless you unignore this specific dependency's major version or upgrade to it yourself) -
@dependabot ignore <dependency name> minor versionwill close this group update PR and stop Dependabot creating any more for the specific dependency's minor version (unless you unignore this specific dependency's minor version or upgrade to it yourself) -
@dependabot ignore <dependency name>will close this group update PR and stop Dependabot creating any more for the specific dependency (unless you unignore this specific dependency or upgrade to it yourself) -
@dependabot unignore <dependency name>will remove all of the ignore conditions of the specified dependency -
@dependabot unignore <dependency name> <ignore condition>will remove the ignore condition of the specified dependency and ignore conditions You can disable automated security fix PRs for this repo from the Security Alerts page.