Skip to content
  • Home
  • Aktuell
  • Tags
  • 0 Ungelesen 0
  • Kategorien
  • Unreplied
  • Beliebt
  • GitHub
  • Docu
  • Hilfe
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Standard: (Kein Skin)
  • Kein Skin
Einklappen
ioBroker Logo

Community Forum

donate donate
  1. ioBroker Community Home
  2. Deutsch
  3. ioBroker Allgemein
  4. js-controller 4.0.x jetzt für alle User im STABLE!

NEWS

  • UPDATE 31.10.: Amazon Alexa - ioBroker Skill läuft aus ?
    apollon77A
    apollon77
    48
    3
    8.5k

  • Monatsrückblick – September 2025
    BluefoxB
    Bluefox
    13
    1
    2.1k

  • Neues Video "KI im Smart Home" - ioBroker plus n8n
    BluefoxB
    Bluefox
    16
    1
    2.7k

js-controller 4.0.x jetzt für alle User im STABLE!

Geplant Angeheftet Gesperrt Verschoben ioBroker Allgemein
501 Beiträge 83 Kommentatoren 155.5k Aufrufe 58 Watching
  • Älteste zuerst
  • Neuste zuerst
  • Meiste Stimmen
Antworten
  • In einem neuen Thema antworten
Anmelden zum Antworten
Dieses Thema wurde gelöscht. Nur Nutzer mit entsprechenden Rechten können es sehen.
  • B blackeagle998

    @apollon77
    Meinst du eine andere 4.0.18 als ich installiert habe?
    51b2c64f-777e-4781-9f98-b2e626542b03-image.png
    Mit der Version ist das jedenfalls gerade wieder passiert.

    apollon77A Offline
    apollon77A Offline
    apollon77
    schrieb am zuletzt editiert von
    #159

    @blackeagle998 Was genau ist passiert? Also die 4.0.15 hatte den Bug das er gar nicht gestartet ist wenn der Wert zur gross war weil an der Code-Stelle wo eine Log Meldung ausgegeben werden sollte das der Wert falsch ist und runterkorrigiert wurde war ein Fehler.

    Aber um nicht alle zu verwirren sollten wir Diskussionen zur BETA Version 4.0.18 bitte im beta Thread führen :-)

    Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

    • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
    • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
    1 Antwort Letzte Antwort
    0
    • apollon77A Offline
      apollon77A Offline
      apollon77
      schrieb am zuletzt editiert von
      #160

      Heute kommt auch das js.controller update 4.0.18 ins Stable mit einigen kleineren Bugfixes die noch aufgefallen waren.

      Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

      • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
      • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
      FabioF P 2 Antworten Letzte Antwort
      1
      • bahnuhrB Offline
        bahnuhrB Offline
        bahnuhr
        Forum Testing Most Active
        schrieb am zuletzt editiert von
        #161

        @apollon77

        Habe gerade 4.0.18 durchgeführt.
        Alles geklappt, läuft einwandfrei.


        Wenn ich helfen konnte, dann Daumen hoch (Pfeil nach oben)!
        Danke.
        gute Forenbeiträge: https://forum.iobroker.net/topic/51555/hinweise-f%C3%BCr-gute-forenbeitr%C3%A4ge
        ScreenToGif :https://www.screentogif.com/downloads.html

        1 Antwort Letzte Antwort
        1
        • apollon77A apollon77

          Heute kommt auch das js.controller update 4.0.18 ins Stable mit einigen kleineren Bugfixes die noch aufgefallen waren.

          FabioF Offline
          FabioF Offline
          Fabio
          schrieb am zuletzt editiert von Fabio
          #162

          @apollon77 vielen Dank Installation 4.0.18 hat einwandfrei geklappt. 👍👌

          Iobroker:

          • Für mich persöhnlich, gibt es nichts besseres, ich liebe es.

          • Das hat unser Smarthome erst zu Smarthome gemacht.

          • Du wächst mit ioBroker und ioBroker wächst mit dir.

          • Benutzt das Voting rechts unten im Beitrag wenn er euch geholfen hat.

          1 Antwort Letzte Antwort
          1
          • apollon77A apollon77

            Heute kommt auch das js.controller update 4.0.18 ins Stable mit einigen kleineren Bugfixes die noch aufgefallen waren.

            P Offline
            P Offline
            Pupsimupsi
            schrieb am zuletzt editiert von
            #163

            @apollon77

            Die Installation 4.0.18 wurde mir heute angeboten und hat soweit auch problemlos geklappt.
            Alles läuft!
            Habe jedoch diese Meldungen beim Update bekommen:

            The following notifications happened during sync: 
            - Ignoring Directory "info.admin" because officially not created as meta object. Please remove directory!
            - Ignoring Directory "netatmo-energy.admin" because officially not created as meta object. Please remove directory!
            

            Was bedeutet das?
            Kann oder muss ich da was tun?

            apollon77A 1 Antwort Letzte Antwort
            0
            • P Pupsimupsi

              @apollon77

              Die Installation 4.0.18 wurde mir heute angeboten und hat soweit auch problemlos geklappt.
              Alles läuft!
              Habe jedoch diese Meldungen beim Update bekommen:

              The following notifications happened during sync: 
              - Ignoring Directory "info.admin" because officially not created as meta object. Please remove directory!
              - Ignoring Directory "netatmo-energy.admin" because officially not created as meta object. Please remove directory!
              

              Was bedeutet das?
              Kann oder muss ich da was tun?

              apollon77A Offline
              apollon77A Offline
              apollon77
              schrieb am zuletzt editiert von
              #164

              @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

              Was bedeutet das?
              Kann oder muss ich da was tun?

              Steht oben in der FAQ ... Post #2 in diesem Thread :-)

              Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

              • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
              • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
              P Mr EnglishM 2 Antworten Letzte Antwort
              1
              • apollon77A apollon77

                @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                Was bedeutet das?
                Kann oder muss ich da was tun?

                Steht oben in der FAQ ... Post #2 in diesem Thread :-)

                P Offline
                P Offline
                Pupsimupsi
                schrieb am zuletzt editiert von
                #165

                @apollon77

                DANKE und sorry!
                Habe nach dem erfolgreichen Update auf Version 4 nicht damit gerechnet das nach einem weiteren Update auf eine höhere 4er Version die gleichen Fehler passieren können...

                Habe gerade "iob upload all" durchgeführt.
                War´s das?
                Kann ich das iwie prüfen ob nun alles OK ist?

                apollon77A 1 Antwort Letzte Antwort
                0
                • P Pupsimupsi

                  @apollon77

                  DANKE und sorry!
                  Habe nach dem erfolgreichen Update auf Version 4 nicht damit gerechnet das nach einem weiteren Update auf eine höhere 4er Version die gleichen Fehler passieren können...

                  Habe gerade "iob upload all" durchgeführt.
                  War´s das?
                  Kann ich das iwie prüfen ob nun alles OK ist?

                  apollon77A Offline
                  apollon77A Offline
                  apollon77
                  schrieb am zuletzt editiert von
                  #166

                  @pupsimupsi Jett liess nochmal oben ... da steht was Du tun kannst wenn diese meldungen kommen. Da sind Daten "out of sync" oder wurden ggf nicht aufgeräumt irgendwann mal. Da steht nicht das irgendein Automatismus dies gefixt hat.

                  Und für dich mal herkopiert was oben steht:

                  Bitte ein iob upload all ausführen. Falls Einträge von Adaptern enthalten sein sollten die nicht mehr installiert sind, dann können diese Dateien manuell gelöscht werden.

                  Aaaaalllssoooooo ... sind denn info und netatmo-energy bei Dir noch installiert?

                  Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

                  • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
                  • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
                  P 1 Antwort Letzte Antwort
                  0
                  • apollon77A apollon77

                    @pupsimupsi Jett liess nochmal oben ... da steht was Du tun kannst wenn diese meldungen kommen. Da sind Daten "out of sync" oder wurden ggf nicht aufgeräumt irgendwann mal. Da steht nicht das irgendein Automatismus dies gefixt hat.

                    Und für dich mal herkopiert was oben steht:

                    Bitte ein iob upload all ausführen. Falls Einträge von Adaptern enthalten sein sollten die nicht mehr installiert sind, dann können diese Dateien manuell gelöscht werden.

                    Aaaaalllssoooooo ... sind denn info und netatmo-energy bei Dir noch installiert?

                    P Offline
                    P Offline
                    Pupsimupsi
                    schrieb am zuletzt editiert von
                    #167

                    @apollon77

                    Aaaaalllssoooooo:
                    Da muss wohl etwas falsch rüber gekommen sein...!?
                    Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

                    Von nem automatischem Fix o.Ä., hab ich nie gesprochen...:thinking_face:
                    Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
                    Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...:disappointed:

                    Ja, sind beide noch installiert.
                    Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                    F apollon77A 2 Antworten Letzte Antwort
                    0
                    • P Pupsimupsi

                      @apollon77

                      Aaaaalllssoooooo:
                      Da muss wohl etwas falsch rüber gekommen sein...!?
                      Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

                      Von nem automatischem Fix o.Ä., hab ich nie gesprochen...:thinking_face:
                      Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
                      Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...:disappointed:

                      Ja, sind beide noch installiert.
                      Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                      F Offline
                      F Offline
                      Feinfinger
                      schrieb am zuletzt editiert von
                      #168

                      Hallo zusammen,

                      bekomme beim Versich von 4.0.15 auf 4.0.18 upzudaten folgenden Fehler:

                      host.ioBroker Cannot install iobroker.js-controller@4.0.18: 217
                      

                      Ich bin nach Anleitung vorgegangen, also iob stop, iob update, iob fix und dann iob upgrade self.

                      iob als LXC im Proxmox
                      Node.js: v22.19.0
                      NPM: 10.9.3
                      js-controller 7.0.7

                      arteckA 1 Antwort Letzte Antwort
                      0
                      • F Feinfinger

                        Hallo zusammen,

                        bekomme beim Versich von 4.0.15 auf 4.0.18 upzudaten folgenden Fehler:

                        host.ioBroker Cannot install iobroker.js-controller@4.0.18: 217
                        

                        Ich bin nach Anleitung vorgegangen, also iob stop, iob update, iob fix und dann iob upgrade self.

                        arteckA Offline
                        arteckA Offline
                        arteck
                        Developer Most Active
                        schrieb am zuletzt editiert von
                        #169

                        @feinfinger da wird was mit npm sein

                        machmal

                        npm i iobroker.js-controller@4.0.18 --production
                        

                        dann siehst du wo es hängt

                        zigbee hab ich, zwave auch, nuc's genauso und HA auch

                        F 1 Antwort Letzte Antwort
                        0
                        • P Pupsimupsi

                          @apollon77

                          Aaaaalllssoooooo:
                          Da muss wohl etwas falsch rüber gekommen sein...!?
                          Ich habe, wie gesagt, nach deinem Hinweis, die FAQ gelesen und "iob upload all" ausgeführt.

                          Von nem automatischem Fix o.Ä., hab ich nie gesprochen...:thinking_face:
                          Ich wollte lediglich wissen, ob ich evtl. irgendwie überprüfen kann, dass nun (nach dem iob upload all) alles "OK" ist.
                          Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...:disappointed:

                          Ja, sind beide noch installiert.
                          Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                          apollon77A Offline
                          apollon77A Offline
                          apollon77
                          schrieb am zuletzt editiert von
                          #170

                          @pupsimupsi sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                          Sorry für´s Nachfragen. Das verkneif ich mir in Zukunft...

                          Alles gut, nachfragen darf man immer. Wenn nur Infos fehlen was Du gemacht hast kann ich nur bestmöglich raten ... Und dann kommen manchmal solche Antworten bei raus.

                          Ja, sind beide noch installiert.
                          Netatmo-energy sogar recht frisch. Erst seit ein paar Tagen.

                          Dann sollte das "upload all" das Problem gefixt haben ... wirst DU beim nächsten js-controller update sehen :-)

                          Beitrag hat geholfen? Votet rechts unten im Beitrag :-) https://paypal.me/Apollon77 / https://github.com/sponsors/Apollon77

                          • Debug-Log für Instanz einschalten? Admin -> Instanzen -> Expertenmodus -> Instanz aufklappen - Loglevel ändern
                          • Logfiles auf Platte /opt/iobroker/log/… nutzen, Admin schneidet Zeilen ab
                          1 Antwort Letzte Antwort
                          1
                          • arteckA arteck

                            @feinfinger da wird was mit npm sein

                            machmal

                            npm i iobroker.js-controller@4.0.18 --production
                            

                            dann siehst du wo es hängt

                            F Offline
                            F Offline
                            Feinfinger
                            schrieb am zuletzt editiert von
                            #171

                            @arteck

                            root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                            
                            added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                            
                            16 packages are looking for funding
                              run `npm fund` for details
                            
                            4 moderate severity vulnerabilities
                            
                            To address all issues (including breaking changes), run:
                              npm audit fix --force
                            
                            Run `npm audit` for details.
                            root@ioBroker:~# npm fund
                            root
                            +-- https://opencollective.com/ioredis
                            |   `-- ioredis@4.28.5
                            +-- https://github.com/sindresorhus/execa?sponsor=1
                            | | `-- execa@5.1.1
                            | `-- https://github.com/sponsors/sindresorhus
                            |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                            +-- https://github.com/sponsors/RubenVerborgh
                            |   `-- follow-redirects@1.14.9
                            +-- https://paulmillr.com/funding/
                            | | `-- chokidar@3.5.3
                            | `-- https://github.com/sponsors/jonschlinkert
                            |     `-- picomatch@2.3.1
                            +-- https://github.com/sponsors/feross
                            |   `-- safe-buffer@5.2.1
                            +-- https://github.com/sponsors/ljharb
                            |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                            +-- https://github.com/sponsors/epoberezkin
                            |   `-- ajv@6.12.6
                            `-- https://github.com/chalk/wrap-ansi?sponsor=1
                              | `-- wrap-ansi@7.0.0
                              `-- https://github.com/chalk/ansi-styles?sponsor=1
                                  `-- ansi-styles@4.3.0
                            
                            root@ioBroker:~# npm audit
                            # npm audit report
                            
                            ansi-regex  >2.1.1 <5.0.1
                            Severity: moderate
                             Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                            fix available via `npm audit fix`
                            node_modules/ansi-regex
                              strip-ansi  4.0.0 - 5.2.0
                              Depends on vulnerable versions of ansi-regex
                              node_modules/strip-ansi
                                cliui  4.0.0 - 5.0.0
                                Depends on vulnerable versions of strip-ansi
                                node_modules/cliui
                                  yargs  8.0.0-candidate.0 - 15.0.0
                                  Depends on vulnerable versions of cliui
                                  Depends on vulnerable versions of yargs-parser
                                  node_modules/yargs
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                string-width  2.1.0 - 4.1.0
                                Depends on vulnerable versions of strip-ansi
                                node_modules/string-width
                            
                            debug  <2.6.9
                            Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                            fix available via `npm audit fix`
                            node_modules/engine.io-client/node_modules/debug
                            node_modules/engine.io/node_modules/debug
                            node_modules/socket.io-adapter/node_modules/debug
                            node_modules/socket.io-client/node_modules/debug
                            node_modules/socket.io-parser/node_modules/debug
                            node_modules/socket.io/node_modules/debug
                              engine.io  <=4.0.0-alpha.1
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of ws
                              node_modules/engine.io
                                socket.io  <=2.4.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                              engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of parsejson
                              Depends on vulnerable versions of ws
                              Depends on vulnerable versions of xmlhttprequest-ssl
                              node_modules/engine.io-client
                                socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io-client
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-client
                              socket.io-adapter  <=1.1.0
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of socket.io-parser
                              node_modules/socket.io-adapter
                              socket.io-parser  <=3.3.1
                              Depends on vulnerable versions of debug
                              node_modules/socket.io-parser
                            
                            engine.io  <=4.0.0-alpha.1
                            Severity: high
                            Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of ws
                            fix available via `npm audit fix`
                            node_modules/engine.io
                              socket.io  <=2.4.1
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of engine.io
                              Depends on vulnerable versions of socket.io-parser
                              node_modules/socket.io
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                            
                            iobroker.js-controller  <=2.1.1
                            Severity: high
                            Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                            Depends on vulnerable versions of redis
                            Depends on vulnerable versions of socket.io
                            Depends on vulnerable versions of socket.io-client
                            Depends on vulnerable versions of winston-daily-rotate-file
                            Depends on vulnerable versions of yargs
                            fix available via `npm audit fix`
                            node_modules/iobroker.js-controller
                            
                            minimist  <0.2.1
                            Severity: moderate
                            Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                            fix available via `npm audit fix`
                            node_modules/winston-daily-rotate-file/node_modules/minimist
                              mkdirp  0.4.1 - 0.5.1
                              Depends on vulnerable versions of minimist
                              node_modules/winston-daily-rotate-file/node_modules/mkdirp
                                winston-daily-rotate-file  1.7.0 - 1.7.2
                                Depends on vulnerable versions of mkdirp
                                node_modules/winston-daily-rotate-file
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                            
                            parsejson  *
                            Severity: high
                            Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                            fix available via `npm audit fix`
                            node_modules/parsejson
                              engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of parsejson
                              Depends on vulnerable versions of ws
                              Depends on vulnerable versions of xmlhttprequest-ssl
                              node_modules/engine.io-client
                                socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io-client
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-client
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                            
                            redis  2.6.0 - 3.1.0
                            Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                            fix available via `npm audit fix`
                            node_modules/redis
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                            
                            socket.io  <=2.4.1
                            Severity: high
                            Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                            Depends on vulnerable versions of debug
                            Depends on vulnerable versions of engine.io
                            Depends on vulnerable versions of socket.io-parser
                            fix available via `npm audit fix`
                            node_modules/socket.io
                              iobroker.js-controller  <=2.1.1
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              node_modules/iobroker.js-controller
                            
                            socket.io-parser  <=3.3.1
                            Severity: high
                            Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                            Depends on vulnerable versions of debug
                            fix available via `npm audit fix`
                            node_modules/socket.io-parser
                              socket.io  <=2.4.1
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of engine.io
                              Depends on vulnerable versions of socket.io-parser
                              node_modules/socket.io
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                              socket.io-adapter  <=1.1.0
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of socket.io-parser
                              node_modules/socket.io-adapter
                              socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of engine.io-client
                              Depends on vulnerable versions of socket.io-parser
                              node_modules/socket.io-client
                            
                            ws  <=1.1.4
                            Severity: high
                            Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                            fix available via `npm audit fix`
                            node_modules/engine.io-client/node_modules/ws
                            node_modules/engine.io/node_modules/ws
                              engine.io  <=4.0.0-alpha.1
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of ws
                              node_modules/engine.io
                                socket.io  <=2.4.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                              engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of parsejson
                              Depends on vulnerable versions of ws
                              Depends on vulnerable versions of xmlhttprequest-ssl
                              node_modules/engine.io-client
                                socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io-client
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-client
                            
                            xmlhttprequest-ssl  <=1.6.1
                            Severity: critical
                            Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                            Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                            fix available via `npm audit fix`
                            node_modules/xmlhttprequest-ssl
                              engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of parsejson
                              Depends on vulnerable versions of ws
                              Depends on vulnerable versions of xmlhttprequest-ssl
                              node_modules/engine.io-client
                                socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io-client
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-client
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                            
                            yargs-parser  6.0.0 - 13.1.1
                            Severity: moderate
                            Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                            fix available via `npm audit fix`
                            node_modules/yargs-parser
                              yargs  8.0.0-candidate.0 - 15.0.0
                              Depends on vulnerable versions of cliui
                              Depends on vulnerable versions of yargs-parser
                              node_modules/yargs
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                            
                            21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                            
                            To address all issues, run:
                              npm audit fix
                            

                            bedeutet das ein npm audit fix ausführen?

                            iob als LXC im Proxmox
                            Node.js: v22.19.0
                            NPM: 10.9.3
                            js-controller 7.0.7

                            arteckA Thomas BraunT 2 Antworten Letzte Antwort
                            0
                            • F Feinfinger

                              @arteck

                              root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                              
                              added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                              
                              16 packages are looking for funding
                                run `npm fund` for details
                              
                              4 moderate severity vulnerabilities
                              
                              To address all issues (including breaking changes), run:
                                npm audit fix --force
                              
                              Run `npm audit` for details.
                              root@ioBroker:~# npm fund
                              root
                              +-- https://opencollective.com/ioredis
                              |   `-- ioredis@4.28.5
                              +-- https://github.com/sindresorhus/execa?sponsor=1
                              | | `-- execa@5.1.1
                              | `-- https://github.com/sponsors/sindresorhus
                              |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                              +-- https://github.com/sponsors/RubenVerborgh
                              |   `-- follow-redirects@1.14.9
                              +-- https://paulmillr.com/funding/
                              | | `-- chokidar@3.5.3
                              | `-- https://github.com/sponsors/jonschlinkert
                              |     `-- picomatch@2.3.1
                              +-- https://github.com/sponsors/feross
                              |   `-- safe-buffer@5.2.1
                              +-- https://github.com/sponsors/ljharb
                              |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                              +-- https://github.com/sponsors/epoberezkin
                              |   `-- ajv@6.12.6
                              `-- https://github.com/chalk/wrap-ansi?sponsor=1
                                | `-- wrap-ansi@7.0.0
                                `-- https://github.com/chalk/ansi-styles?sponsor=1
                                    `-- ansi-styles@4.3.0
                              
                              root@ioBroker:~# npm audit
                              # npm audit report
                              
                              ansi-regex  >2.1.1 <5.0.1
                              Severity: moderate
                               Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                              fix available via `npm audit fix`
                              node_modules/ansi-regex
                                strip-ansi  4.0.0 - 5.2.0
                                Depends on vulnerable versions of ansi-regex
                                node_modules/strip-ansi
                                  cliui  4.0.0 - 5.0.0
                                  Depends on vulnerable versions of strip-ansi
                                  node_modules/cliui
                                    yargs  8.0.0-candidate.0 - 15.0.0
                                    Depends on vulnerable versions of cliui
                                    Depends on vulnerable versions of yargs-parser
                                    node_modules/yargs
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                  string-width  2.1.0 - 4.1.0
                                  Depends on vulnerable versions of strip-ansi
                                  node_modules/string-width
                              
                              debug  <2.6.9
                              Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                              fix available via `npm audit fix`
                              node_modules/engine.io-client/node_modules/debug
                              node_modules/engine.io/node_modules/debug
                              node_modules/socket.io-adapter/node_modules/debug
                              node_modules/socket.io-client/node_modules/debug
                              node_modules/socket.io-parser/node_modules/debug
                              node_modules/socket.io/node_modules/debug
                                engine.io  <=4.0.0-alpha.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of ws
                                node_modules/engine.io
                                  socket.io  <=2.4.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of parsejson
                                Depends on vulnerable versions of ws
                                Depends on vulnerable versions of xmlhttprequest-ssl
                                node_modules/engine.io-client
                                  socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io-client
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-client
                                socket.io-adapter  <=1.1.0
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-adapter
                                socket.io-parser  <=3.3.1
                                Depends on vulnerable versions of debug
                                node_modules/socket.io-parser
                              
                              engine.io  <=4.0.0-alpha.1
                              Severity: high
                              Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of ws
                              fix available via `npm audit fix`
                              node_modules/engine.io
                                socket.io  <=2.4.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                              
                              iobroker.js-controller  <=2.1.1
                              Severity: high
                              Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                              Depends on vulnerable versions of redis
                              Depends on vulnerable versions of socket.io
                              Depends on vulnerable versions of socket.io-client
                              Depends on vulnerable versions of winston-daily-rotate-file
                              Depends on vulnerable versions of yargs
                              fix available via `npm audit fix`
                              node_modules/iobroker.js-controller
                              
                              minimist  <0.2.1
                              Severity: moderate
                              Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                              fix available via `npm audit fix`
                              node_modules/winston-daily-rotate-file/node_modules/minimist
                                mkdirp  0.4.1 - 0.5.1
                                Depends on vulnerable versions of minimist
                                node_modules/winston-daily-rotate-file/node_modules/mkdirp
                                  winston-daily-rotate-file  1.7.0 - 1.7.2
                                  Depends on vulnerable versions of mkdirp
                                  node_modules/winston-daily-rotate-file
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                              
                              parsejson  *
                              Severity: high
                              Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                              fix available via `npm audit fix`
                              node_modules/parsejson
                                engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of parsejson
                                Depends on vulnerable versions of ws
                                Depends on vulnerable versions of xmlhttprequest-ssl
                                node_modules/engine.io-client
                                  socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io-client
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-client
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                              
                              redis  2.6.0 - 3.1.0
                              Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                              fix available via `npm audit fix`
                              node_modules/redis
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                              
                              socket.io  <=2.4.1
                              Severity: high
                              Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                              Depends on vulnerable versions of debug
                              Depends on vulnerable versions of engine.io
                              Depends on vulnerable versions of socket.io-parser
                              fix available via `npm audit fix`
                              node_modules/socket.io
                                iobroker.js-controller  <=2.1.1
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                node_modules/iobroker.js-controller
                              
                              socket.io-parser  <=3.3.1
                              Severity: high
                              Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                              Depends on vulnerable versions of debug
                              fix available via `npm audit fix`
                              node_modules/socket.io-parser
                                socket.io  <=2.4.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                                socket.io-adapter  <=1.1.0
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-adapter
                                socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io-client
                                Depends on vulnerable versions of socket.io-parser
                                node_modules/socket.io-client
                              
                              ws  <=1.1.4
                              Severity: high
                              Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                              fix available via `npm audit fix`
                              node_modules/engine.io-client/node_modules/ws
                              node_modules/engine.io/node_modules/ws
                                engine.io  <=4.0.0-alpha.1
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of ws
                                node_modules/engine.io
                                  socket.io  <=2.4.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of parsejson
                                Depends on vulnerable versions of ws
                                Depends on vulnerable versions of xmlhttprequest-ssl
                                node_modules/engine.io-client
                                  socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io-client
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-client
                              
                              xmlhttprequest-ssl  <=1.6.1
                              Severity: critical
                              Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                              Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                              fix available via `npm audit fix`
                              node_modules/xmlhttprequest-ssl
                                engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of parsejson
                                Depends on vulnerable versions of ws
                                Depends on vulnerable versions of xmlhttprequest-ssl
                                node_modules/engine.io-client
                                  socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io-client
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-client
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                              
                              yargs-parser  6.0.0 - 13.1.1
                              Severity: moderate
                              Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                              fix available via `npm audit fix`
                              node_modules/yargs-parser
                                yargs  8.0.0-candidate.0 - 15.0.0
                                Depends on vulnerable versions of cliui
                                Depends on vulnerable versions of yargs-parser
                                node_modules/yargs
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                              
                              21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                              
                              To address all issues, run:
                                npm audit fix
                              

                              bedeutet das ein npm audit fix ausführen?

                              arteckA Offline
                              arteckA Offline
                              arteck
                              Developer Most Active
                              schrieb am zuletzt editiert von arteck
                              #172

                              @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                              bedeutet das ein npm audit fix ausführen?

                              NEIN..

                              und stell dich mal richtig hin

                              cd /opt/iobroker
                              npm i iobroker.js-controller@4.0.18 --production
                              

                              und erst dann

                              wobei mach direkt die .19 drauf

                              npm i iobroker.js-controller@4.0.19 --production
                              

                              zigbee hab ich, zwave auch, nuc's genauso und HA auch

                              F 1 Antwort Letzte Antwort
                              0
                              • F Feinfinger

                                @arteck

                                root@ioBroker:~# npm i iobroker.js-controller@4.0.18 --production
                                
                                added 150 packages, removed 169 packages, changed 46 packages, and audited 311 packages in 1m
                                
                                16 packages are looking for funding
                                  run `npm fund` for details
                                
                                4 moderate severity vulnerabilities
                                
                                To address all issues (including breaking changes), run:
                                  npm audit fix --force
                                
                                Run `npm audit` for details.
                                root@ioBroker:~# npm fund
                                root
                                +-- https://opencollective.com/ioredis
                                |   `-- ioredis@4.28.5
                                +-- https://github.com/sindresorhus/execa?sponsor=1
                                | | `-- execa@5.1.1
                                | `-- https://github.com/sponsors/sindresorhus
                                |     `-- get-stream@6.0.1, is-stream@2.0.1, onetime@5.1.2
                                +-- https://github.com/sponsors/RubenVerborgh
                                |   `-- follow-redirects@1.14.9
                                +-- https://paulmillr.com/funding/
                                | | `-- chokidar@3.5.3
                                | `-- https://github.com/sponsors/jonschlinkert
                                |     `-- picomatch@2.3.1
                                +-- https://github.com/sponsors/feross
                                |   `-- safe-buffer@5.2.1
                                +-- https://github.com/sponsors/ljharb
                                |   `-- is-nan@1.3.2, call-bind@1.0.2, get-intrinsic@1.1.1, has-symbols@1.0.3
                                +-- https://github.com/sponsors/epoberezkin
                                |   `-- ajv@6.12.6
                                `-- https://github.com/chalk/wrap-ansi?sponsor=1
                                  | `-- wrap-ansi@7.0.0
                                  `-- https://github.com/chalk/ansi-styles?sponsor=1
                                      `-- ansi-styles@4.3.0
                                
                                root@ioBroker:~# npm audit
                                # npm audit report
                                
                                ansi-regex  >2.1.1 <5.0.1
                                Severity: moderate
                                 Inefficient Regular Expression Complexity in chalk/ansi-regex - https://github.com/advisories/GHSA-93q8-gq69-wqmw
                                fix available via `npm audit fix`
                                node_modules/ansi-regex
                                  strip-ansi  4.0.0 - 5.2.0
                                  Depends on vulnerable versions of ansi-regex
                                  node_modules/strip-ansi
                                    cliui  4.0.0 - 5.0.0
                                    Depends on vulnerable versions of strip-ansi
                                    node_modules/cliui
                                      yargs  8.0.0-candidate.0 - 15.0.0
                                      Depends on vulnerable versions of cliui
                                      Depends on vulnerable versions of yargs-parser
                                      node_modules/yargs
                                        iobroker.js-controller  <=2.1.1
                                        Depends on vulnerable versions of redis
                                        Depends on vulnerable versions of socket.io
                                        Depends on vulnerable versions of socket.io-client
                                        Depends on vulnerable versions of winston-daily-rotate-file
                                        Depends on vulnerable versions of yargs
                                        node_modules/iobroker.js-controller
                                    string-width  2.1.0 - 4.1.0
                                    Depends on vulnerable versions of strip-ansi
                                    node_modules/string-width
                                
                                debug  <2.6.9
                                Regular Expression Denial of Service in debug - https://github.com/advisories/GHSA-gxpj-cx7g-858c
                                fix available via `npm audit fix`
                                node_modules/engine.io-client/node_modules/debug
                                node_modules/engine.io/node_modules/debug
                                node_modules/socket.io-adapter/node_modules/debug
                                node_modules/socket.io-client/node_modules/debug
                                node_modules/socket.io-parser/node_modules/debug
                                node_modules/socket.io/node_modules/debug
                                  engine.io  <=4.0.0-alpha.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of ws
                                  node_modules/engine.io
                                    socket.io  <=2.4.1
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                  engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of parsejson
                                  Depends on vulnerable versions of ws
                                  Depends on vulnerable versions of xmlhttprequest-ssl
                                  node_modules/engine.io-client
                                    socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io-client
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io-client
                                  socket.io-adapter  <=1.1.0
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-adapter
                                  socket.io-parser  <=3.3.1
                                  Depends on vulnerable versions of debug
                                  node_modules/socket.io-parser
                                
                                engine.io  <=4.0.0-alpha.1
                                Severity: high
                                Resource exhaustion in engine.io  - https://github.com/advisories/GHSA-j4f2-536g-r55m
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of ws
                                fix available via `npm audit fix`
                                node_modules/engine.io
                                  socket.io  <=2.4.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                
                                iobroker.js-controller  <=2.1.1
                                Severity: high
                                Arbitrary File Write in iobroker.js-controller - https://github.com/advisories/GHSA-cmch-296j-wfvw
                                Depends on vulnerable versions of redis
                                Depends on vulnerable versions of socket.io
                                Depends on vulnerable versions of socket.io-client
                                Depends on vulnerable versions of winston-daily-rotate-file
                                Depends on vulnerable versions of yargs
                                fix available via `npm audit fix`
                                node_modules/iobroker.js-controller
                                
                                minimist  <0.2.1
                                Severity: moderate
                                Prototype Pollution in minimist - https://github.com/advisories/GHSA-vh95-rmgr-6w4m
                                fix available via `npm audit fix`
                                node_modules/winston-daily-rotate-file/node_modules/minimist
                                  mkdirp  0.4.1 - 0.5.1
                                  Depends on vulnerable versions of minimist
                                  node_modules/winston-daily-rotate-file/node_modules/mkdirp
                                    winston-daily-rotate-file  1.7.0 - 1.7.2
                                    Depends on vulnerable versions of mkdirp
                                    node_modules/winston-daily-rotate-file
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                
                                parsejson  *
                                Severity: high
                                Regular Expression Denial of Service in parsejson - https://github.com/advisories/GHSA-q75g-2496-mxpp
                                fix available via `npm audit fix`
                                node_modules/parsejson
                                  engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of parsejson
                                  Depends on vulnerable versions of ws
                                  Depends on vulnerable versions of xmlhttprequest-ssl
                                  node_modules/engine.io-client
                                    socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io-client
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io-client
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                
                                redis  2.6.0 - 3.1.0
                                Potential exponential regex in monitor mode - https://github.com/advisories/GHSA-35q2-47q7-3pc3
                                fix available via `npm audit fix`
                                node_modules/redis
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                                
                                socket.io  <=2.4.1
                                Severity: high
                                Insecure defaults due to CORS misconfiguration in socket.io - https://github.com/advisories/GHSA-fxwf-4rqh-v8g3
                                Depends on vulnerable versions of debug
                                Depends on vulnerable versions of engine.io
                                Depends on vulnerable versions of socket.io-parser
                                fix available via `npm audit fix`
                                node_modules/socket.io
                                  iobroker.js-controller  <=2.1.1
                                  Depends on vulnerable versions of redis
                                  Depends on vulnerable versions of socket.io
                                  Depends on vulnerable versions of socket.io-client
                                  Depends on vulnerable versions of winston-daily-rotate-file
                                  Depends on vulnerable versions of yargs
                                  node_modules/iobroker.js-controller
                                
                                socket.io-parser  <=3.3.1
                                Severity: high
                                Resource exhaustion in socket.io-parser - https://github.com/advisories/GHSA-xfhh-g9f5-x4m4
                                Depends on vulnerable versions of debug
                                fix available via `npm audit fix`
                                node_modules/socket.io-parser
                                  socket.io  <=2.4.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                  socket.io-adapter  <=1.1.0
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-adapter
                                  socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of engine.io-client
                                  Depends on vulnerable versions of socket.io-parser
                                  node_modules/socket.io-client
                                
                                ws  <=1.1.4
                                Severity: high
                                Denial of Service in ws - https://github.com/advisories/GHSA-5v72-xg48-5rpm
                                fix available via `npm audit fix`
                                node_modules/engine.io-client/node_modules/ws
                                node_modules/engine.io/node_modules/ws
                                  engine.io  <=4.0.0-alpha.1
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of ws
                                  node_modules/engine.io
                                    socket.io  <=2.4.1
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                  engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of parsejson
                                  Depends on vulnerable versions of ws
                                  Depends on vulnerable versions of xmlhttprequest-ssl
                                  node_modules/engine.io-client
                                    socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io-client
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io-client
                                
                                xmlhttprequest-ssl  <=1.6.1
                                Severity: critical
                                Improper Certificate Validation in xmlhttprequest-ssl - https://github.com/advisories/GHSA-72mh-269x-7mh5
                                Arbitrary Code Injection - https://github.com/advisories/GHSA-h4j5-c7cj-74xg
                                fix available via `npm audit fix`
                                node_modules/xmlhttprequest-ssl
                                  engine.io-client  <=3.3.2 || 3.4.0 - 3.5.1 || 4.0.0-alpha.0 - 4.1.3
                                  Depends on vulnerable versions of debug
                                  Depends on vulnerable versions of parsejson
                                  Depends on vulnerable versions of ws
                                  Depends on vulnerable versions of xmlhttprequest-ssl
                                  node_modules/engine.io-client
                                    socket.io-client  1.0.0-pre - 2.1.1 || 2.3.0 - 2.3.1 || 3.0.0-rc1 - 3.0.5
                                    Depends on vulnerable versions of debug
                                    Depends on vulnerable versions of engine.io-client
                                    Depends on vulnerable versions of socket.io-parser
                                    node_modules/socket.io-client
                                      iobroker.js-controller  <=2.1.1
                                      Depends on vulnerable versions of redis
                                      Depends on vulnerable versions of socket.io
                                      Depends on vulnerable versions of socket.io-client
                                      Depends on vulnerable versions of winston-daily-rotate-file
                                      Depends on vulnerable versions of yargs
                                      node_modules/iobroker.js-controller
                                
                                yargs-parser  6.0.0 - 13.1.1
                                Severity: moderate
                                Prototype Pollution in yargs-parser - https://github.com/advisories/GHSA-p9pc-299p-vxgp
                                fix available via `npm audit fix`
                                node_modules/yargs-parser
                                  yargs  8.0.0-candidate.0 - 15.0.0
                                  Depends on vulnerable versions of cliui
                                  Depends on vulnerable versions of yargs-parser
                                  node_modules/yargs
                                    iobroker.js-controller  <=2.1.1
                                    Depends on vulnerable versions of redis
                                    Depends on vulnerable versions of socket.io
                                    Depends on vulnerable versions of socket.io-client
                                    Depends on vulnerable versions of winston-daily-rotate-file
                                    Depends on vulnerable versions of yargs
                                    node_modules/iobroker.js-controller
                                
                                21 vulnerabilities (2 low, 9 moderate, 7 high, 3 critical)
                                
                                To address all issues, run:
                                  npm audit fix
                                

                                bedeutet das ein npm audit fix ausführen?

                                Thomas BraunT Online
                                Thomas BraunT Online
                                Thomas Braun
                                Most Active
                                schrieb am zuletzt editiert von
                                #173

                                @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                root@ioBroker

                                Und hüpf da nicht als root rum.

                                Linux-Werkzeugkasten:
                                https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                NodeJS Fixer Skript:
                                https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                1 Antwort Letzte Antwort
                                0
                                • arteckA arteck

                                  @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                  bedeutet das ein npm audit fix ausführen?

                                  NEIN..

                                  und stell dich mal richtig hin

                                  cd /opt/iobroker
                                  npm i iobroker.js-controller@4.0.18 --production
                                  

                                  und erst dann

                                  wobei mach direkt die .19 drauf

                                  npm i iobroker.js-controller@4.0.19 --production
                                  
                                  F Offline
                                  F Offline
                                  Feinfinger
                                  schrieb am zuletzt editiert von
                                  #174

                                  @arteck

                                  Danke für die Hilfe, aber da ist wohl mehr im Busch.

                                  Frage mich, warum updates bisher immer geklappt haben?

                                  root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                                  npm ERR! code ENOTEMPTY
                                  npm ERR! syscall rename
                                  npm ERR! path /opt/iobroker/node_modules/abab
                                  npm ERR! dest /opt/iobroker/node_modules/.abab-bvmibCm3
                                  npm ERR! errno -39
                                  npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'
                                  
                                  npm ERR! A complete log of this run can be found in:
                                  npm ERR!     /home/iobroker/.npm/_logs/2022-03-07T08_39_26_200Z-debug-0.log
                                  

                                  iob als LXC im Proxmox
                                  Node.js: v22.19.0
                                  NPM: 10.9.3
                                  js-controller 7.0.7

                                  Thomas BraunT 1 Antwort Letzte Antwort
                                  0
                                  • F Feinfinger

                                    @arteck

                                    Danke für die Hilfe, aber da ist wohl mehr im Busch.

                                    Frage mich, warum updates bisher immer geklappt haben?

                                    root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                                    npm ERR! code ENOTEMPTY
                                    npm ERR! syscall rename
                                    npm ERR! path /opt/iobroker/node_modules/abab
                                    npm ERR! dest /opt/iobroker/node_modules/.abab-bvmibCm3
                                    npm ERR! errno -39
                                    npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'
                                    
                                    npm ERR! A complete log of this run can be found in:
                                    npm ERR!     /home/iobroker/.npm/_logs/2022-03-07T08_39_26_200Z-debug-0.log
                                    
                                    Thomas BraunT Online
                                    Thomas BraunT Online
                                    Thomas Braun
                                    Most Active
                                    schrieb am zuletzt editiert von
                                    #175

                                    @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                    directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'

                                    Dann mach das doch mal.

                                    Linux-Werkzeugkasten:
                                    https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                    NodeJS Fixer Skript:
                                    https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                    iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                    F 1 Antwort Letzte Antwort
                                    0
                                    • Thomas BraunT Thomas Braun

                                      @feinfinger sagte in js-controller 4.0.x jetzt für alle User im STABLE!:

                                      directory not empty, rename '/opt/iobroker/node_modules/abab' -> '/opt/iobroker/node_modules/.abab-bvmibCm3'

                                      Dann mach das doch mal.

                                      F Offline
                                      F Offline
                                      Feinfinger
                                      schrieb am zuletzt editiert von
                                      #176

                                      @thomas-braun

                                      Dann kommt der nächste Fehler...

                                      root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                                      npm ERR! code ENOTEMPTY
                                      npm ERR! syscall rename
                                      npm ERR! path /opt/iobroker/node_modules/abbrev
                                      npm ERR! dest /opt/iobroker/node_modules/.abbrev-5eNud0FY
                                      npm ERR! errno -39
                                      npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abbrev' -> '/opt/iobroker/node_modules/.abbrev-5eNud0FY'
                                      

                                      Was mich wundert ist, das diese Ordner alle vorhanden sind...

                                      iob als LXC im Proxmox
                                      Node.js: v22.19.0
                                      NPM: 10.9.3
                                      js-controller 7.0.7

                                      Thomas BraunT 1 Antwort Letzte Antwort
                                      0
                                      • F Feinfinger

                                        @thomas-braun

                                        Dann kommt der nächste Fehler...

                                        root@ioBroker:/opt/iobroker# npm i iobroker.js-controller@4.0.19 --production
                                        npm ERR! code ENOTEMPTY
                                        npm ERR! syscall rename
                                        npm ERR! path /opt/iobroker/node_modules/abbrev
                                        npm ERR! dest /opt/iobroker/node_modules/.abbrev-5eNud0FY
                                        npm ERR! errno -39
                                        npm ERR! ENOTEMPTY: directory not empty, rename '/opt/iobroker/node_modules/abbrev' -> '/opt/iobroker/node_modules/.abbrev-5eNud0FY'
                                        

                                        Was mich wundert ist, das diese Ordner alle vorhanden sind...

                                        Thomas BraunT Online
                                        Thomas BraunT Online
                                        Thomas Braun
                                        Most Active
                                        schrieb am zuletzt editiert von
                                        #177

                                        @feinfinger
                                        Dann mache es nochmal...
                                        Und wie gesagt, hampel da nicht als root rum.

                                        Linux-Werkzeugkasten:
                                        https://forum.iobroker.net/topic/42952/der-kleine-iobroker-linux-werkzeugkasten
                                        NodeJS Fixer Skript:
                                        https://forum.iobroker.net/topic/68035/iob-node-fix-skript
                                        iob_diag: curl -sLf -o diag.sh https://iobroker.net/diag.sh && bash diag.sh

                                        Rene55R F 2 Antworten Letzte Antwort
                                        0
                                        • Thomas BraunT Thomas Braun

                                          @feinfinger
                                          Dann mache es nochmal...
                                          Und wie gesagt, hampel da nicht als root rum.

                                          Rene55R Online
                                          Rene55R Online
                                          Rene55
                                          schrieb am zuletzt editiert von
                                          #178

                                          @thomas-braun Und hüpf da nicht als root rum.
                                          Ich habe eben meine Installation (Docker-Image von Buanet) meinen js-Controller auf 4.0.18 hochgezogen. In der Console hab ich dazu 'root@iobroker:/opt/iobroker# iob upgrade self' ausgeführt. Dieser root ist ja so vorgegeben! Ist das ein anderer root, so dass ich den benutzen darf ?

                                          Host: Fujitsu Intel(R) Pentium(R) CPU G4560T, 32 GB RAM, Proxmox 8.x + lxc Ubuntu 22.04
                                          ioBroker (8 GB RAM) Node.js: 20.19.1, NPM: 10.8.2, js-Controller: 7.0.6, Admin: 7.6.3
                                          Wetterstation: Froggit WH3000SE V1.6.6

                                          Thomas BraunT 1 Antwort Letzte Antwort
                                          0
                                          Antworten
                                          • In einem neuen Thema antworten
                                          Anmelden zum Antworten
                                          • Älteste zuerst
                                          • Neuste zuerst
                                          • Meiste Stimmen


                                          Support us

                                          ioBroker
                                          Community Adapters
                                          Donate
                                          FAQ Cloud / IOT
                                          HowTo: Node.js-Update
                                          HowTo: Backup/Restore
                                          Downloads
                                          BLOG

                                          316

                                          Online

                                          32.4k

                                          Benutzer

                                          81.5k

                                          Themen

                                          1.3m

                                          Beiträge
                                          Community
                                          Impressum | Datenschutz-Bestimmungen | Nutzungsbedingungen | Einwilligungseinstellungen
                                          ioBroker Community 2014-2025
                                          logo
                                          • Anmelden

                                          • Du hast noch kein Konto? Registrieren

                                          • Anmelden oder registrieren, um zu suchen
                                          • Erster Beitrag
                                            Letzter Beitrag
                                          0
                                          • Home
                                          • Aktuell
                                          • Tags
                                          • Ungelesen 0
                                          • Kategorien
                                          • Unreplied
                                          • Beliebt
                                          • GitHub
                                          • Docu
                                          • Hilfe