@commitlint/cli versions 4.3.0 and 4.2.2 provide tools to lint commit messages, ensuring consistency and adherence to project standards. Both versions share core dependencies like meow for CLI argument parsing, chalk for stylized console output, lodash for utility functions, get-stdin for reading from stdin, and babel-polyfill for ES5 compatibility. A crucial dependency, @commitlint/core, which houses the core linting logic, experiences an update; 4.3.0 uses version 4.3.0 of this core while 4.2.2 relies on version 4.2.2.
Developer tooling also shows some variation. Both versions leverage xo and ava for linting and testing respectively, alongside utilities like tmp, execa, mkdirp, rimraf, and sander for file system operations. Build tools like babel-cli, cross-env, resolve-bin, and concurrently are present in both. The testing harness differs with @commitlint/test updated from version 4.2.1 to 4.3.0. @commitlint/utils and babel-preset-commitlint remain at version 4.2.1 in both releases.
The key difference lies in the updated core linting library and associated testing utilities. Developers upgrading to 4.3.0 should review the changes within @commitlint/core version 4.3.0 to understand any potential impact on their commitlint configuration and linting rules. The update to @commitlint/test suggests improvements or fixes in the testing framework, potentially offering better test coverage for custom rules or configurations. Both versions offer MIT licensing emphasizing their open-source nature and suitability for diverse projects.
All the vulnerabilities related to the version 4.3.0 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
dot-prop Prototype Pollution vulnerability
Prototype pollution vulnerability in dot-prop npm package versions before 4.2.1 and versions 5.x before 5.1.1 allows an attacker to add arbitrary properties to JavaScript language constructs such as objects.