Browserify version 2.2.0 introduces subtle but potentially impactful changes compared to its immediate predecessor, version 2.1.0. While the core functionality of enabling require()-style modularization within browser environments remains consistent, the dependency updates signal key internal improvements. Specifically, module-deps advances from version 0.2.1 to 0.2.6, and browser-pack jumps from 0.2.1 to 0.3.0. These updates suggest enhancements in how Browserify analyzes and bundles modules, potentially leading to faster build times, smaller bundle sizes, or improved compatibility with complex dependency graphs. Developers should investigate these updated dependencies for bug fixes, performance improvements, or new features relevant to their specific projects.
Both versions maintain identical dependencies on crucial packages like through, duplexer, inherits, optimist, JSONStream, syntax-error, browser-resolve, and insert-module-globals, ensuring continuity in core functionalities. Similarly, the development dependencies—seq, tap, dnode, mkdirp, and backbone—remain the same, indicating a stable testing and development environment. The consistent license (MIT), repository details, and author information emphasize the ongoing maintenance and community support for Browserify. Developers relying on Browserify for browser-side modularization should carefully evaluate the changes in module-deps and browser-pack to determine whether upgrading to version 2.2.0 offers tangible benefits for their projects, weighing potential improvements against the effort of testing for compatibility. The patch versions may contain essential bug fixes.
All the vulnerabilities related to the version 2.2.0 of the package
Incorrect Handling of Non-Boolean Comparisons During Minification in uglify-js
Versions of uglify-js
prior to 2.4.24 are affected by a vulnerability which may cause crafted JavaScript to have altered functionality after minification.
Upgrade UglifyJS to version >= 2.4.24.
Regular Expression Denial of Service in uglify-js
Versions of uglify-js
prior to 2.6.0 are affected by a regular expression denial of service vulnerability when malicious inputs are passed into the parse()
method.
var u = require('uglify-js');
var genstr = function (len, chr) {
var result = "";
for (i=0; i<=len; i++) {
result = result + chr;
}
return result;
}
u.parse("var a = " + genstr(process.argv[2], "1") + ".1ee7;");
$ time node test.js 10000
real 0m1.091s
user 0m1.047s
sys 0m0.039s
$ time node test.js 80000
real 0m6.486s
user 0m6.229s
sys 0m0.094s
Update to version 2.6.0 or later.
Potential for Script Injection in syntax-error
Versions of syntax-error
prior to 1.1.1 are affected by a cross-site scripting vulnerability which may allow a malicious file to execute code when browserified.
Update to version 1.1.1 or later.