-
-
Notifications
You must be signed in to change notification settings - Fork 207
fix: update pbkdf2 to 3.1.3 #243
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
Not needed, ever, because of semver ranges. |
Respectfully, I disagree. |
|
"best practice" does not mean it's "needed", and either way, a PR isn't helping. Updating every single dependent in a tree every time there's a vulnerability is a lot of burden on unpaid maintainers, and there is simply no urgency to it. |
@ljharb I am not asking, nor do I think others are asking unpaid maintainers to update every single dependency in a tree. That seems like a hasty generalization. It seems more reasonable to me that if an issue is filed and gets traction from a user base, that the issue should likely be addressed. And that contributors have a means to address the issue to avoid stress on maintainers. I think I have explained sufficiently why this change is needed, regardless of being a best practice or not. The original reason for rejection was |
|
It's still correct - because even if it never happens, new installs will use the fixed version by default, preexisting installs can update their lockfiles without any additional action from any open source maintainers, and dozens of security tools will ensure that a vulnerable version isn't unknowingly in the tree. |
It is not correct. This is true most of the time, but not all the time. For instance, in a fresh project: npm install [email protected]
npm install crypto-browserify
npm uninstall pbkdf2leaves the vulnerability installed (check the lockfile) because the dependency is satisfied. If
Correct. I have done this already. But lockfiles are subject to change, and it leaves the projects vulnerable to the same pitfall mentioned above.
That's if its being actively looked for by the person or org installing the dependency. It could easily revert after being fixed in a lockfile and may not be caught. It's best to fix the issue upstream. Are you able to answer my above asks? I feel like if I had clear instructions on what I would need to do to make this contribution acceptable and help... I would. But it's still unclear to me. |
minimum to resolve security vulnerability https://security.snyk.io/vuln/SNYK-JS-PBKDF2-10495498.