Brace expansion, a lightweight npm package providing shell-like brace expansion capabilities, has seen a minor update from version 1.1.5 to 1.1.6. While both versions maintain the core functionality of expanding brace patterns into lists of strings, crucial for tasks like generating file lists or complex configurations, the key difference lies in their development dependencies. Version 1.1.6 upgrades the tape testing library to version ^4.6.0, a bump from version 4.5.1 in 1.1.5. This update likely addresses bug fixes, performance improvements, or new features within the testing framework itself, potentially leading to more robust and comprehensive testing of the brace-expansion library.
For developers, this means version 1.1.6 benefits from potentially improved test coverage and stability due to the updated testing environment. The core dependencies for utilizing the library remain the same, with both versions relying on concat-map and balanced-match. Therefore, the upgrade presents minimal risk of breaking changes while offering the potential benefit of increased code quality assurance. If you're already using brace-expansion, upgrading to 1.1.6 is a worthwhile consideration to leverage the improvements in the underlying testing infrastructure. If you are starting using the library, the 1.1.6 is a good version to pick from the start. Both versions are licensed under the MIT license, offering flexibility for integration into various projects.
All the vulnerabilities related to the version 1.1.6 of the package
ReDoS in brace-expansion
Affected versions of brace-expansion
are vulnerable to a regular expression denial of service condition.
var expand = require('brace-expansion');
expand('{,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,\n}');
Update to version 1.1.7 or later.
brace-expansion Regular Expression Denial of Service vulnerability
A vulnerability was found in juliangruber brace-expansion up to 1.1.11/2.0.1/3.0.0/4.0.0. It has been rated as problematic. Affected by this issue is the function expand of the file index.js. The manipulation leads to inefficient regular expression complexity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.1.12, 2.0.2, 3.0.1 and 4.0.1 is able to address this issue. The name of the patch is a5b98a4f30d7813266b221435e1eaaf25a1b0ac5
. It is recommended to upgrade the affected component.