All the vulnerabilities related to the version 11.0.0 of the package
Electron vulnerable to Heap Buffer Overflow in NativeImage
The nativeImage.createFromPath()
and nativeImage.createFromBuffer()
functions call a function downstream that is vulnerable to a heap buffer overflow. An Electron program that uses either of the affected functions is vulnerable to a buffer overflow if an attacker is in control of the image's height, width, and contents.
There are no app-side workarounds for this issue. You must update your Electron version to be protected.
v28.3.2
v29.3.3
v30.0.3
If you have any questions or comments about this advisory, email us at security@electronjs.org.
Electron has ASAR Integrity Bypass via resource modification
This only impacts apps that have the embeddedAsarIntegrityValidation
and onlyLoadAppFromAsar
fuses enabled. Apps without these fuses enabled are not impacted.
Specifically this issue can only be exploited if your app is launched from a filesystem the attacker has write access too. i.e. the ability to edit files inside the resources
folder in your app installation on Windows which these fuses are supposed to protect against.
There are no app side workarounds, you must update to a patched version of Electron.
38.0.0-beta.6
37.3.1
36.8.1
35.7.5
If you have any questions or comments about this advisory, email us at security@electronjs.org