[GHSA-qf5v-q897-m77r] The ip (aka node-ip) package through 2.0.1 (in NPM) might...#7243
[GHSA-qf5v-q897-m77r] The ip (aka node-ip) package through 2.0.1 (in NPM) might...#7243bughir0 wants to merge 1 commit intobughir0/advisory-improvement-7243from
Conversation
|
Hi,
Additionally, the same versions are reported as vulnerable. Do you have any additional information confirming whether GHSA-2p57-rm9w-gvfp has been patched? We want to avoid adding a duplicate advisory, and if there isn’t a fix yet, it’s unclear how there could be a bypass of a CVE with no available patch. |
Thanks for reviewing this. I do not have additional upstream evidence showing that GHSA-2p57-rm9w-gvfp has been patched. In my review, the upstream node-ip repository still shows the related work as open/unmerged, including issue #150 and the linked draft/open PRs, and GHSA-2p57-rm9w-gvfp still describes ip through 2.0.1 as vulnerable. () My intent with this submission was only to add verifiable package/source metadata and the upstream issue that specifically matches the octal-form example 017700000001. I do not have evidence of a distinct upstream fix followed by a separate bypass after that fix. Given that, I agree this may be better treated as part of GHSA-2p57-rm9w-gvfp rather than as a separate advisory. () If helpful, I’m fine with closing this submission as a duplicate or having the relevant reference folded into GHSA-2p57-rm9w-gvfp instead. |
Updates
Comments
This update adds verifiable upstream metadata for the npm package
ipand its source repositoryindutny/node-ip, and adds the upstream issue that specifically matches this advisory’s octal-format behavior (017700000001). I did not add a patched version or fix commit because I found no merged upstream fix, no newer release than2.0.1, and no public upstream evidence establishing a patched version.