@commitlint/cli, a valuable tool for enforcing commit message conventions, saw a minor update from version 3.0.0 to 3.0.1. Both versions fundamentally serve the same purpose: linting commit messages to maintain consistency and clarity in a project's history. They share core dependencies like meow for CLI argument parsing, chalk for colorful terminal output, lodash for utility functions, get-stdin for reading from standard input, and babel-polyfill for broader JavaScript compatibility. Crucially, both versions include @commitlint/core, the heart of the linting logic. The development dependencies, including tools like xo for linting, ava for testing, execa for process execution, dependency-check for dependency management, and string-to-stream for stream manipulation, remain consistent between these versions, indicating a focus on maintaining existing development workflows. The minor version bump from 3.0.0 to 3.0.1 signals a patch release, suggesting that the changes likely involve bug fixes, minor improvements, or dependency updates that don't introduce new features or break existing functionality. However, a key difference is in the dependency @commitlint/core, the version 3.0.0 depends on "@commitlint/core":"^3.0.0", and the version 3.0.1 depends on "@commitlint/core":"^3.0.1". For developers, upgrading from 3.0.0 to 3.0.1 is generally recommended to benefit from these stability and reliability enhancements.
All the vulnerabilities related to the version 3.0.1 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.