-
-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(deps): fix vulnerability inefficient regular expression complexity #15082
chore(deps): fix vulnerability inefficient regular expression complexity #15082
Conversation
✅ Deploy Preview for jestjs ready!Built without sensitive environment variables
To edit notification comments on pull requests, go to your Netlify site configuration. |
a2a22c8
to
8bf314b
Compare
Co-authored-by: Simen Bekkhus <sbekkhus91@gmail.com>
070189b
to
524d9c3
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
@SimenB why jest is releasing this kind of vulnerability fix on an alpha version instead of publishing a new |
The update is in semver range, so any consumer is not blocked. This just gives it a boost |
This pull request has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
should fix the vulnerability "Inefficient regular expression complexity" in micromatch dep
https://security.snyk.io/vuln/SNYK-JS-MICROMATCH-6838728