Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

refresh the lockfile to automatically remove the vulnerability introduced in @aginix/nestjs-gcloud-storage #450

Open
paimon0715 opened this issue Aug 22, 2021 · 0 comments

Comments

@paimon0715
Copy link

Hi, @n3n, I have reported a vulnerability issue in package @google-cloud/storage.

As far as I am aware, vulnerability CVE-2020-26289 detected in package date-and-time<0.14.2) is directly referenced by  @google-cloud/[email protected], on which your package @aginix/[email protected] directly depends. As such, this vulnerability can also affect @aginix/[email protected] via the following path:
@aginix/[email protected] ➔ @google-cloud/[email protected][email protected](vulnerable version)

Since @google-cloud/storage has released a new patched version @google-cloud/[email protected] to resolve this issue (@google-cloud/[email protected][email protected](fix version)), then this vulnerability patch can be automatically propagated into your project only if you update your lockfile. The following is your new dependency path :
@aginix/[email protected] ➔ @google-cloud/[email protected][email protected](vulnerability fix version).

dependency path

A warm tip.
Best regards,
^_^

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant