-
-
Notifications
You must be signed in to change notification settings - Fork 6.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
esbuild security issue from npm audit
#19412
Comments
the esbuild CVE is for the esbuild dev server, that Vite doesn't use. It was reported by @sapphi-red, after fixing a similar issue on vite's side. please don't ignore the issue template next time, and always provide a minimal reproduction |
I don't recall being prompted with an issue template… odd. I will watch for that though next time. Is there a problem with updating though? Not updating will mean noise in security reporting tools. |
We only update esbuild minors on Vite minors. PR to do the update here: security reporting tools should stop making noise |
I agree, I wish there were an easy way to not flag things for unused features… maybe that is a reason for things to be published as multiple, smaller packages instead of one though; e.g. if the esbuild dev server were its own package then it would reduce noise. |
My 2 cts abou that.
Yep this could be a way.
A bit what VEX is trying to achieve but it seems not really popular for now. 🤷 Using VEX could be a good way to avoid some false positive during vulnerabilities check. For me details see : |
npm audit
Hey folks! Should this issue be re-opened? It is currently marked as Closed: Not Planned but it looks like it is a part of the 6.2 Milestone in this PR: #19389 |
We don't need to reopen this issue. There isn't any security issue in Vite at the moment. We always update esbuild in each vite minor, that is what that PR is doing. The automated tooling reporting this issue should be fixed, but we are going to release the next minor soon. |
Thank you, @patak-dev. That does make sense and sounds good. But, I would like to echo @sbernard31. A security audit mostly doesn't care if you are correct that you are not vulnerable to the CVE. It cares primarily whether or not your dependency tree results in the installation of known vulnerable code. Understanding this, I'll just propose to the conversation that dependabot and other tools reporting this as a vulnerability are not incorrect and are not noise. The package results in the installation of known vulnerable software and, therefore, contains vulnerabilities regardless of whether or not it is considered at the time that it can be triggered. I totally understand y'alls reasoning though. Just throwing in my 2-cents from the perspective of dealing with projects that require these levels of scrutiny. |
…ture when upstream vite/svelte fix) * see vitejs/vite#19412
Another 2-cents of thought: IMO this is unfortunately not a simple "bump the patch version for esbuild" fix because of esbuild's versioning choices. Despite being a stable, long-lived project used by millions over the last five years, the maintainer has kept the project in version zero (initial development) all this time. I've been commenting on a two-years old issue to try to argue why releasing v1 could make it easier to remediate things like this vulnerability. I am not sure that it's an easy ask for a solo maintainer to do all the legwork of LTS maintenance and EOL management, but given the massive usage of their project, I think it is a fair thing to talk about. |
until new version is available we can override esbuild version by adding below lines to package.json
Thanks to reddit comment |
- fixes vulnerability with esbuild for vite dev server, see: vitejs/vite#19412
- fixes vulnerability with esbuild for vite dev server, see: vitejs/vite#19412
* chore: update deps * chore: upgrade deps - fixes vulnerability with esbuild for vite dev server, see: vitejs/vite#19412
See: vitejs/vite#19412 Signed-off-by: Dylan Vos <[email protected]> (github: ThaDaVos)
* refactor: MainArea Component * feat: ファイルリスト表示を追加 * chore: update javascript modules * fix: esbuild security issue vitejs/vite#19412 * chore: FB * chore: ディレクトリ構造の変更 * fix: SonarQube issues * chore: FB * chore: 改めてディレクトリ変更 * chore: FB
See: vitejs/vite#19412 Signed-off-by: Dylan Vos <[email protected]> (github: ThaDaVos)
Note
You may get a following npm audit report when installing Vite.
This vulnerability does not affect Vite and this audit report can be ignored for the meanwhile. We plan to upgrade esbuild in the next minor version. Note that running
npm audit fix --force
confusingly installs a quite old version of Vite which is not maintained anymore and should not be run.Edited by @sapphi-red
May we get esbuild updated to 0.25.0 to address GHSA-67mh-4wv8-2f99?
The text was updated successfully, but these errors were encountered: