Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. concat-stream
  4. ›
  5. GMS-2019-18

GMS-2019-18: Memory Exposure in concat-stream

June 3, 2019 (updated May 23, 2022)

Versions of concat-stream is vulnerable to memory exposure if userp provided input is passed into write()

are not affected due to not using unguarded Buffer constructor. Update to or later.

If you are unable to update make sure user provided input into the write() function is not a number.

References

  • gist.github.com/ChALkeR/c2d2fd3f1d72d51ad883df195be03a85
  • github.com/advisories/GHSA-g74r-ffvr-5q9f
  • github.com/maxogden/concat-stream/pull/47
  • github.com/maxogden/concat-stream/pull/47/commits/3e285ba5e5b10b7c98552217f5c1023829efe69e
  • nodesecurity.io/advisories/597
  • www.npmjs.com/advisories/597

Code Behaviors & Features

Detect and mitigate GMS-2019-18 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

all versions starting from 1.3.0 before 1.3.2, all versions starting from 1.4.0 before 1.4.11, all versions starting from from 1.5.0 before 1.5.2

Fixed versions

  • 1.3.2
  • 1.4.11
  • 1.5.2

Solution

Upgrade to versions 1.3.2, 1.4.11, 1.5.2 or above.

Source file

npm/concat-stream/GMS-2019-18.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:43 +0000.