Safety vulnerability ID: 64213
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Bullmq 5.1.3 upgrades its msgpackr dependency to version ^1.10.1 from the earlier ^1.6.2, in response to the security vulnerability identified as CVE-2023-52079.
https://github.com/taskforcesh/bullmq/commit/7ae095357fddbdaacc286cbe5782946b95160d55
Latest version: 2.16.0
BullMQ for Python
[5.1.3](https://github.com/taskforcesh/bullmq/compare/v5.1.2...v5.1.3) (2024-01-16)
Bug Fixes
* **retry-jobs:** add marker when needed ([2374](https://github.com/taskforcesh/bullmq/issues/2374)) ([1813d5f](https://github.com/taskforcesh/bullmq/commit/1813d5fa12b7db69ee6c8c09273729cda8e3e3b5))
vpy2.2.1
Fix
* **retry-jobs:** Add marker when needed ([2374](https://github.com/taskforcesh/bullmq/issues/2374)) ([`1813d5f`](https://github.com/taskforcesh/bullmq/commit/1813d5fa12b7db69ee6c8c09273729cda8e3e3b5))
* **security:** Upgrade msgpackr https://github.com/advisories/GHSA-7hpj-7hhx-2fgx ([`7ae0953`](https://github.com/taskforcesh/bullmq/commit/7ae095357fddbdaacc286cbe5782946b95160d55))
Documentation
* **changelog:** Split changelog ([2381](https://github.com/taskforcesh/bullmq/issues/2381)) ([`368b5a1`](https://github.com/taskforcesh/bullmq/commit/368b5a104b632fa181b2c19cc5e3530387f38ae4))
* **summary:** Add remove dependency section ([2378](https://github.com/taskforcesh/bullmq/issues/2378)) ([`03e1451`](https://github.com/taskforcesh/bullmq/commit/03e1451f54edf56f11f9e74f9b4095efe522bb97))
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application