Skip to content

Conversation

@tido64
Copy link
Member

@tido64 tido64 commented Feb 12, 2024

Description

The only difference between 1.1.8 and 2.0.0 is the use of Buffer.alloc instead of new Buffer (diff).

For details on the CVE, see GHSA-78xj-cgh5-2h22.

Platforms affected

  • Android
  • iOS
  • macOS
  • Windows

Test plan

n/a

@tido64 tido64 requested a review from kelset as a code owner February 12, 2024 10:22
@tido64 tido64 merged commit 37e4e05 into trunk Feb 12, 2024
@tido64 tido64 deleted the tido/address-CVE-2023-42282 branch February 12, 2024 10:47
@levpachmanov
Copy link

Hi @tido64 @kelset,

[email protected] is affected by CVE-2023-42282 - github/advisory-database#3504
Unfortunately, the library is no longer maintained, so there is no public solution.

We're part of a startup called Seal Security that mitigates software vulnerabilities in older open source versions by backporting/creating standalone security patches - enabling more straightforward remediation in cases like this. We created an ip 1.1.8-sp and 2.0.0-sp1 that's vulnerability-free. As with all of our patches, it's open-source and available for free.

If relevant, check out our GitHub repo if you wish to learn more, or start using our app.

Please feel free to reach us at [email protected] if you have any requests/questions.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants