Rollup Plugin Name: terser
This PR contains:
Are tests included?
Breaking Changes?
If yes, then include "BREAKING CHANGES:" in the first commit message body, followed by a description of what is breaking.
List any relevant issue numbers:
Description
This PR updates serialize-javascript dependency from ^7.0.3 to ^7.0.5 to fix two security vulnerabilities:
-
GHSA-5c6j-r48x-rmvq (High severity): Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.toISOString()
-
GHSA-qj8w-gfj5-8c6v (Moderate severity): Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
Impact on Downstream Libraries
This vulnerability affects multiple downstream libraries in the dependency chain:
serialize-javascript (vulnerable)
↓
@rollup/plugin-terser (uses serialize-javascript)
↓
workbox-build (uses @rollup/plugin-terser)
↓
vite-plugin-pwa (uses workbox-build)
- workbox-build: Uses
@rollup/plugin-terser@^0.4.3 which depends on serialize-javascript@^6.0.1
- vite-plugin-pwa: Uses
workbox-build which pulls in the vulnerable chain
Reference: GoogleChrome/workbox#3470
Fix
Update packages/terser/package.json:
- Change:
"serialize-javascript": "^7.0.3" → "serialize-javascript": "^7.0.5"
Rollup Plugin Name:
terserThis PR contains:
Are tests included?
Breaking Changes?
If yes, then include "BREAKING CHANGES:" in the first commit message body, followed by a description of what is breaking.
List any relevant issue numbers:
Description
This PR updates
serialize-javascriptdependency from^7.0.3to^7.0.5to fix two security vulnerabilities:GHSA-5c6j-r48x-rmvq (High severity): Serialize JavaScript is Vulnerable to RCE via RegExp.flags and Date.prototype.toISOString()
GHSA-qj8w-gfj5-8c6v (Moderate severity): Serialize JavaScript has CPU Exhaustion Denial of Service via crafted array-like objects
Impact on Downstream Libraries
This vulnerability affects multiple downstream libraries in the dependency chain:
@rollup/plugin-terser@^0.4.3which depends onserialize-javascript@^6.0.1workbox-buildwhich pulls in the vulnerable chainReference: GoogleChrome/workbox#3470
Fix
Update
packages/terser/package.json:"serialize-javascript": "^7.0.3"→"serialize-javascript": "^7.0.5"