Update dependency marked to v2 [SECURITY]
Created by: renovate[bot]
This PR contains the following updates:
Package | Change | Age | Adoption | Passing | Confidence |
---|---|---|---|---|---|
marked (source) | ^1.2.7 -> ^2.0.0 |
GitHub Vulnerability Alerts
CVE-2021-21306
Impact
What kind of vulnerability is it? Who is impacted?
Regular expression Denial of Service
A Denial of Service attack can affect anyone who runs user generated code through marked
.
Patches
Has the problem been patched? What versions should users upgrade to?
patched in v2.0.0
Workarounds
Is there a way for users to fix or remediate the vulnerability without upgrading?
None.
References
Are there any links users can visit to find out more?
https://github.com/markedjs/marked/issues/1927 https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS
For more information
If you have any questions or comments about this advisory:
- Open an issue in marked
Release Notes
markedjs/marked
v2.0.0
Bug Fixes
- Join adjacent inlineText tokens (#1926) (f848e77)
- Total rework of Emphasis/Strong (#1864) (7293251)
BREAKING CHANGES
-
em
andstrong
tokenizers have been merged into oneemStrong
tokenizer. -
code
andtext
tokenizers do not get passed all tokens as a second parameter. - No longer supporting IE 11. IE 11 may still work but we are not committed to making sure it works with every update. We still provide an es5 version in
lib/marked.js
but some pollyfills may be needed for IE 11 in the future.
v1.2.9
Bug Fixes
v1.2.8
Bug Fixes
Configuration
-
If you want to rebase/retry this PR, check this box.
This PR has been generated by WhiteSource Renovate. View repository job log here.