Update dependency protobufjs to v6.11.4 [SECURITY]#67
Open
renovate[bot] wants to merge 1 commit intomasterfrom
Open
Update dependency protobufjs to v6.11.4 [SECURITY]#67renovate[bot] wants to merge 1 commit intomasterfrom
renovate[bot] wants to merge 1 commit intomasterfrom
Conversation
696e6b9 to
3f95314
Compare
3f95314 to
6a48a00
Compare
6a48a00 to
c022755
Compare
c022755 to
0f8ef26
Compare
0f8ef26 to
e0fe80b
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
6.10.2→6.11.4GitHub Vulnerability Alerts
CVE-2022-25878
The package protobufjs is vulnerable to Prototype Pollution, which can allow an attacker to add/modify properties of the Object.prototype. Versions after and including 6.10.0 until 6.10.3 and after and including 6.11.0 until 6.11.3 are vulnerable.
This vulnerability can occur in multiple ways:
CVE-2023-36665
protobuf.js (aka protobufjs) 6.10.0 until 6.11.4 and 7.0.0 until 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about
Object.constructor.prototype.<new-property> = ...;whereas CVE-2022-25878 was aboutObject.__proto__.<new-property> = ...;instead.Release Notes
protobufjs/protobuf.js (protobufjs)
v6.11.4Compare Source
v6.11.3Compare Source
6.11.3 (2022-05-20)
Bug Fixes
v6.11.2Compare Source
6.11.2 (2021-04-30)
v6.11.1Compare Source
6.11.1 (2021-04-29)
Bug Fixes
v6.11.0Compare Source
6.11.0 (2021-04-28)
Features
optionalfields (@alexander-fenster) (#1584)--no-serviceoption forpbjs(@mdouglass) (#1577)Bug Fixes
oneofmembers to default values, usenullinstead (@alexander-fenster) (#1597)Dependencies
@types/nodeto>= 13.7.0in dependencies (@indutny) (#1575)v6.10.3Compare Source
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.