Conventional Changelog Core, a vital component in automating changelog generation from commit messages, saw a minor version bump from 4.1.3 to 4.1.4. Examining the package metadata reveals a subtle evolution rather than a radical overhaul. Both versions share an identical set of dependencies, leveraging libraries like q for promises, lodash for utility functions, read-pkg and read-pkg-up for package.json handling, and through2 and add-stream for stream manipulation. Key dependencies like dateformat, get-pkg-repo, git-raw-commits, git-semver-tags, git-remote-origin-url, normalize-package-data, conventional-commits-parser, and conventional-changelog-writer remain pinned to the same versions, ensuring consistent behavior in parsing commit messages and formatting the changelog output.
The most notable difference lies in the dist section, specifically the unpackedSize. Version 4.1.4 has an unpacked size of 45073 bytes, a slight increase from version 4.1.3's 44706 bytes. While seemingly small, this suggests that some underlying code adjustments were made, perhaps bug fixes, minor feature enhancements, or internal refactoring, rather than substantial API changes. The release date also indicates that 4.1.4 was published on December 15, 2019, after 4.1.3, which was released on November 27, 2019. Developers upgrading from 4.1.3 to 4.1.4 can likely expect a seamless transition, with any changes being focused on stability and possibly slight performance improvements, without the need to adjust existing code relying on the core library's functionalities. This makes the upgrade a recommended one for staying current with the project and benefiting from the latest refinements.
All the vulnerabilities related to the version 4.1.4 of the package
Uncontrolled Resource Consumption in trim-newlines
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The trim-newlines package before 3.0.1 and 4.x before 4.0.1 for Node.js has an issue related to regular expression denial-of-service (ReDoS) for the .end()
method.
Command Injection in lodash
lodash
versions prior to 4.17.21 are vulnerable to Command Injection via the template function.