fix(deps): update dependency file-type to v21 [security]#79
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
fix(deps): update dependency file-type to v21 [security]#79renovate[bot] wants to merge 1 commit intomainfrom
renovate[bot] wants to merge 1 commit intomainfrom
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
^16.5.4→^21.0.0GitHub Vulnerability Alerts
CVE-2026-31808
Impact
A denial of service vulnerability exists in the ASF (WMV/WMA) file type detection parser. When parsing a crafted input where an ASF sub-header has a
sizefield of zero, the parser enters an infinite loop. Thepayloadvalue becomes negative (-24), causingtokenizer.ignore(payload)to move the read position backwards, so the same sub-header is read repeatedly forever.Any application that uses
file-typeto detect the type of untrusted/attacker-controlled input is affected. An attacker can stall the Node.js event loop with a 55-byte payload.Patches
Fixed in version 21.3.1. Users should upgrade to >= 21.3.1.
Workarounds
Validate or limit the size of input buffers before passing them to
file-type, or run file type detection in a worker thread with a timeout.References
Reporter
crnkovic@lokvica.com
Release Notes
sindresorhus/file-type (file-type)
v21.3.1Compare Source
319abf8v21.3.0Compare Source
d223491v21.2.0Compare Source
889f638093dba0v21.1.1Compare Source
710e053v21.1.0Compare Source
.tar.gz(gunzipped tarball file) (#763)eda03a70db61ec7d2ddcf.dat) (#767)f8d62be7ad3a90v21.0.0Compare Source
Breaking
24aec1faf169f3f53f5ffb9fda3698e3f8e7184775Improvements
d264029mpegOffsetToleranceoption (#646)c40840aFixes
574d0d6v20.5.0Compare Source
f1b4c7av20.4.1Compare Source
bundleras the module-resolution in TypeScript (#744)90bfe33v20.4.0Compare Source
3e576a6v20.3.0Compare Source
nodesubpath export (#741)8d39f668d39f66v20.2.0Compare Source
d05d49dv20.1.0Compare Source
ef486f1v20.0.1Compare Source
f34e9f7v20.0.0Compare Source
Breaking
0ff11c6NodeFileTypeParserin favor of usingFileTypeParseron all platforms (#707)ff8eed8Improvements
FileTypeParser#detectors(#704)7e72bbccf6fc1e.jar) (#719)86518097fe56674db407d1fe621a643ef78.xltx) (#712)0dab3e0.potx) (#710)f978619@tokenizer/inflate(#695)399b0f1.lz4file format (#706)74acf94.drc, Google's Draco 3D Data Compression (#702)e99257dFixes
7d4dd8dv19.6.0Compare Source
5ce98f37b100124dcb8c59945877v19.5.0Compare Source
21ed763v19.4.1Compare Source
fileTypeStreamin default entry point (#653)ea314a4v19.4.0Compare Source
fileTypeStream()(#649)2000141fileTypeStream()(#650)bd3b5a4v19.3.0Compare Source
2744be7v19.2.0Compare Source
NodeFileTypeParser#fromFile()(#644)9d2ee026440b3dv19.1.1Compare Source
fileTypeFromTokenizer(#639)20fdba7v19.1.0Compare Source
00e051bb815b5eRelease notes
v19.0.0Compare Source
Breaking
7f4b30baudio/wavinstead ofaudio/vnd.wavefor .wav files (#620)c7c923cv18.7.0Compare Source
4b7eb75f5b232cv18.6.0Compare Source
ec4980bv18.5.0Compare Source
0ccebb1v18.4.0Compare Source
34ab7d4v18.3.0Compare Source
Blobin Node.js (#588)1c75cfb51bd34c1899fc1f84e96c935470ea40f828v18.2.1Compare Source
edf59f8v18.2.0Compare Source
1ec164bv18.1.0Compare Source
Improvements
47aa221.pst) (#573)ec3ba33.jls) (#568)976ed4bFixes
e8bc341v18.0.0Compare Source
Breaking
6d457c5v17.1.6Compare Source
e843d73v17.1.5Compare Source
a0c24ebv17.1.4Compare Source
20a90abv17.1.3Compare Source
2c4d120v17.1.2Compare Source
1b10a71v17.1.1Compare Source
1a553e7v17.1.0Compare Source
c4983ea752afb3v17.0.2Compare Source
565f7f3v17.0.1Compare Source
strtok3&token-typesdependencies for explicitnode:bufferimports (#507)b27fb5fv17.0.0Compare Source
Breaking
826b4ad/browsersub-export287e361require('file-type').fromBuffer→import {fileTypeFromBuffer} from 'file-type'require('file-type').fromFile→import {fileTypeFromFile} from 'file-type'require('file-type').fromStream→import {fileTypeFromStream} from 'file-type'require('file-type').fromTokenizer→import {fileTypeFromTokenizer} from 'file-type'require('file-type').stream→import {fileTypeStream} from 'file-type'require('file-type').extensions→import {supportedExtensions} from 'file-type'require('file-type').mimeTypes→import {supportedMimeTypes} from 'file-type'Improvements
b23be6282c9ccb4ce6838a2cf2b38bca6b4Fixes
stream()(#468)67c8fcbConfiguration
📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.