Skip to content

Releases: Qix-/color-string

1.7.4

26 Nov 08:01

Choose a tag to compare

Patch Release 1.7.4

  • Fix bug in .to.hex() output if the inputs aren't rounded numbers (#25)

1.7.3

26 Nov 07:54

Choose a tag to compare

Patch Release 1.7.3

  • Fix hue modulo operation (#50)

Thanks to @adroitwhiz for their contributions.

1.7.2

26 Nov 07:53

Choose a tag to compare

Patch Release 1.7.2

  • Fix issue where color-string with incorrectly return a color for properties on Object's prototype like "constructor". (#45)

Thanks to @tolmasky for their contributions.

1.7.1

26 Nov 07:38

Choose a tag to compare

Patch release 1.7.1

  • Reduce acceptable characters in keyword matching regex (#42)

Thanks to @benmccann for their contributions!

1.7.0

26 Nov 07:32

Choose a tag to compare

Minor Release 1.7.0

  • Add support for space-separated RGB (#58)
  • Removed Travis CI in favor of Github Actions
  • Small repository cleanup.

Thanks to @JJC1138 and @clytras for their contributions!

1.6.0

17 Jul 06:34

Choose a tag to compare

Minor release 1.6.0

  • #55 - Add support for space-separated HSL

Thanks @htunnicliff for the contribution :)

1.5.5 (Patch/Security Release) - hwb() ReDos patch (low-severity)

05 Mar 18:01

Choose a tag to compare

Release notes copied verbatim from the commit message, which can be found here: 0789e21

Discovered by Yeting Li, c/o Colin Ife via Snyk.io.

A ReDos (Regular Expression Denial of Service) vulnerability
was responsibly disclosed to me via email by Colin on
Mar 5 2021 regarding an exponential time complexity for
linearly increasing input lengths for `hwb()` color strings.

Strings reaching more than 5000 characters would see several
milliseconds of processing time; strings reaching more than
50,000 characters began seeing 1500ms (1.5s) of processing time.

The cause was due to a the regular expression that parses
hwb() strings - specifically, the hue value - where
the integer portion of the hue value used a 0-or-more quantifier
shortly thereafter followed by a 1-or-more quantifier.

This caused excessive backtracking and a cartesian scan,
resulting in exponential time complexity given a linear
increase in input length.

Thank you Yeting Li and Colin Ife for bringing this to my
attention in a secure, responsible and professional manner.

A CVE will not be assigned for this vulnerability.

1.5.4 (Patch Release)

09 Oct 07:35

Choose a tag to compare

0.3.0

19 Feb 07:22

Choose a tag to compare

  • Fixed: HSL alpha channel (#16)
  • Fixed: ability to parse signed number (#15)
  • Removed: component.json
  • Removed: browser build

- Added: license field to package.json (#17)

Check out commit logs for earlier releases