Skip to content

Commit d3761e3

Browse files
committedJul 9, 2024··
docs(security): add the list of CVE for the socket.io-client package
1 parent afdc3b2 commit d3761e3

File tree

5 files changed

+26
-94
lines changed

5 files changed

+26
-94
lines changed
 

Diff for: ‎SECURITY.md

+26
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,13 @@
11
# Security Policy
22

3+
<!-- TOC -->
4+
* [Supported Versions](#supported-versions)
5+
* [Reporting a Vulnerability](#reporting-a-vulnerability)
6+
* [History](#history)
7+
* [For the `socket.io` package](#for-the-socketio-package)
8+
* [For the `socket.io-client` package](#for-the-socketio-client-package)
9+
<!-- TOC -->
10+
311
## Supported Versions
412

513
| Version | Supported |
@@ -19,6 +27,8 @@ We will get back to you as soon as possible and publish a fix if necessary.
1927

2028
## History
2129

30+
### For the `socket.io` package
31+
2232
| Date | Description | CVE number | Affected versions | Patched versions |
2333
|--------------|------------------------------------------------------------------------------|------------------|-------------------------------------|-----------------------|
2434
| July 2012 | [Insecure randomness](https://github.com/advisories/GHSA-qv2v-m59f-v5fw) | `CVE-2017-16031` | `<= 0.9.6` | `0.9.7` |
@@ -41,3 +51,19 @@ From the transitive dependencies:
4151
| May 2023 | `engine.io` | [Uncaught exception](https://github.com/advisories/GHSA-q9mw-68c2-j6m5) | `CVE-2023-31125` |
4252
| May 2023 | `socket.io-parser` | [Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9) | `CVE-2023-32695` |
4353
| June 2024 | `ws` | [DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q) | `CVE-2024-37890` |
54+
55+
### For the `socket.io-client` package
56+
57+
From the transitive dependencies:
58+
59+
| Date | Dependency | Description | CVE number |
60+
|---------------|--------------------|---------------------------------------------------------------------------------------------------------------|------------------|
61+
| January 2016 | `ws` | [Buffer vulnerability](https://github.com/advisories/GHSA-2mhh-w6q8-5hxw) | `CVE-2016-10518` |
62+
| January 2016 | `ws` | [DoS due to excessively large websocket message](https://github.com/advisories/GHSA-6663-c963-2gqg) | `CVE-2016-10542` |
63+
| October 2016 | `engine.io-client` | [Insecure Defaults Allow MITM Over TLS](https://github.com/advisories/GHSA-4r4m-hjwj-43p8) | `CVE-2016-10536` |
64+
| November 2017 | `ws` | [DoS in the `Sec-Websocket-Extensions` header parser](https://github.com/advisories/GHSA-5v72-xg48-5rpm) | `-` |
65+
| January 2021 | `socket.io-parser` | [Resource exhaustion](https://github.com/advisories/GHSA-xfhh-g9f5-x4m4) | `CVE-2020-36049` |
66+
| May 2021 | `ws` | [ReDoS in `Sec-Websocket-Protocol` header](https://github.com/advisories/GHSA-6fc8-4gx4-v693) | `CVE-2021-32640` |
67+
| October 2022 | `socket.io-parser` | [Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-qm95-pgcg-qqfq) | `CVE-2022-2421` |
68+
| May 2023 | `socket.io-parser` | [Insufficient validation when decoding a Socket.IO packet](https://github.com/advisories/GHSA-cqmj-92xf-r6r9) | `CVE-2023-32695` |
69+
| June 2024 | `ws` | [DoS when handling a request with many HTTP headers](https://github.com/advisories/GHSA-3h5v-q93c-6h6q) | `CVE-2024-37890` |

Diff for: ‎packages/engine.io-client/SECURITY.md

-22
This file was deleted.

Diff for: ‎packages/engine.io/SECURITY.md

-25
This file was deleted.

Diff for: ‎packages/socket.io-client/SECURITY.md

-22
This file was deleted.

Diff for: ‎packages/socket.io-parser/SECURITY.md

-25
This file was deleted.

0 commit comments

Comments
 (0)
Please sign in to comment.