@commitlint/cli versions 4.0.0 and 4.1.0 offer developers a tool to lint commit messages, ensuring consistency and adherence to project standards. Both versions share a common foundation, utilizing dependencies like 'meow' for CLI argument parsing, 'chalk' for styled console output, and 'lodash' for utility functions. They both leverage 'get-stdin' to read commit messages from standard input and 'babel-polyfill' for broader JavaScript compatibility.
The key difference lies in the core functionality. Version 4.1.0 upgrades the dependency "@commitlint/core" from version 4.0.0 to 4.1.0. This core package is responsible for the actual commit message linting logic, meaning version 4.1.0 likely introduces new linting rules, bug fixes, or performance improvements within the core linting process. Developers upgrading from 4.0.0 should carefully review the changelog for "@commitlint/core@4.1.0" to understand these changes and ensure compatibility with their existing commit message conventions. Both versions share the same development dependencies, suggesting a consistent development and testing environment, including tools like 'xo' for code linting, 'ava' for testing, and various utilities for file system manipulation. The release dates show a close succession, with version 4.1.0. released shortly after 4.0.0 on 2017-10-05. Upgrading is advisable, understanding that the core linting logic has been upgraded.
All the vulnerabilities related to the version 4.1.0 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.