Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3NHItZmZ2ci01cTlm

Memory Exposure in concat-stream

Versions of concat-stream before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into write()

Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.

Recommendation

Update to version 1.5.2, 1.4.11, 1.3.2 or later.

If you are unable to update make sure user provided input into the write() function is not a number.

Permalink: https://github.com/advisories/GHSA-g74r-ffvr-5q9f
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3NHItZmZ2ci01cTlm
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 5 years ago
Updated: almost 2 years ago


Identifiers: GHSA-g74r-ffvr-5q9f
References: Repository: https://github.com/maxogden/concat-stream
Blast Radius: 0.0

Affected Packages

npm:concat-stream
Dependent packages: 4,740
Dependent repositories: 1,049,268
Downloads: 101,359,528 last month
Affected Version Ranges: >= 1.3.0, < 1.3.2, >= 1.4.0, < 1.4.11, >= 1.5.0, < 1.5.2
Fixed in: 1.3.2, 1.4.11, 1.5.2
All affected versions: 1.3.0, 1.3.1, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.4.8, 1.4.10, 1.5.0, 1.5.1
All unaffected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.1.0, 0.1.1, 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.2.1, 1.3.2, 1.4.11, 1.5.2, 1.6.0, 1.6.1, 1.6.2, 2.0.0