-
Notifications
You must be signed in to change notification settings - Fork 105
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
NPM 6 - vulnerability - Memory Exposure #41
Comments
Looks like this was fixed but the author neglected to publish v0.6.1 on NPM. |
When will v.0.6.1 be released on NPM? |
+1 |
I'm seeing the fix in my version I got from NPM. Just seems the version number wasn't updated to match. It was a simple one line change, so you should easily be able to see if you have the fix as well. Check line 131 of the index.js file. Link to commit |
its been almost a month. Can we please get the NPM package version updated please? |
Please publish to NPM!? |
+1 |
Am totally new to the npm audit, I want to know if I can actually continue developing without applying this fix because I have tried updating to the latest 0.6.0 tunnel-agent package but it won't fix the warning. |
Please run npm publish |
1 similar comment
Please run npm publish |
Is this safe to use without the |
ah, i just saw, its broken downstream; nevermind. |
+1 ☝️ |
|
There are no commits in this repo since the last release so I'm not sure exactly what it is that I'm meant to be releasing? |
@mikeal I think people are assuming there's a fix for the current NPM memory exposure audit error, why the version bump to 0.6.1 if there's no changes since 0.6.0?
|
Odd release numbers don't get published, they are only in-tree, this makes it easier to see when people are using git checkouts rather than npm releases. |
What is the status of this package? |
Oh my. I am still waiting on this to be fixed for npm also, re: #41
|
For everyone coming to this issue after seeing this in their npm audit, the latest version, v0.6.0 has patched this issue. Most likely, the reason you are seeing the advisory is because a dependency nested somewhere in your application is relying on an unpatched version of this package, likely many layers down. In the example above, Your best bet is to see if you're project's direct dependency, in this case |
Moderate │ Memory Exposure │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Package │ tunnel-agent │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Patched in │ >=0.6.0 │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Dependency of │ node-sass │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ Path │ node-sass > request > tunnel-agent │
├───────────────┼──────────────────────────────────────────────────────────────┤
│ More info │ https://nodesecurity.io/advisories/598
The text was updated successfully, but these errors were encountered: