-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use @versatica/sctp fork to fix npm audit vulnerability #1472
Conversation
## Details - I've forked NPM `ip` package (see https://github.com/versatica/node-ip), removed public API affected by the [vulnerability](GHSA-2p57-rm9w-gvfp) and published version 3.0.0 under `@versatica` NPM organization. - I've forked NPM `sctp` package(see https://github.com/versatica/node-sctp), updated deps and (of course) replace `ip` with `@versativa/ip` dependency, and published version 1.1.0 under `@versatica` NPM organization. - And of course I've replaced `sctp` with `@versativa/sctp` in mediasoup, so now `npm audit` is ok.
According to comments in the original repo |
Honestly I don't want to spend too much time on this topic. We only use |
I'm not getting that info: $ npm install mediasoup
added 64 packages in 6s
21 packages are looking for funding
run `npm fund` for details
|
Ok, things may have changed. In the past
The thing is that I did it already. |
Do you want to keep 2 forks for a warning that only happens in local (just applies to a tests) and that is perfectly known? $ npm audit
# npm audit report
ip *
Severity: high
ip SSRF improper categorization in isPublic - https://github.com/advisories/GHSA-2p57-rm9w-gvfp
No fix available
node_modules/ip
sctp *
Depends on vulnerable versions of ip
node_modules/sctp
2 high severity vulnerabilities If you want this, I'll approve it, but IMO it makes no much sense. |
If you don't want to loose the work totally, you can put the pickport module under @versatica |
Ok, I'm closing this because it was not as important as I thought based on #1472 (comment) |
But you literally forked the library and will effectively have to maintain it anyway 🙃 |
Details
ip
package (see https://github.com/versatica/node-ip), removed public API affected by the vulnerability and published version 3.0.0 under@versatica
NPM organization.sctp
package(see https://github.com/versatica/node-sctp), updated deps and (of course) replaceip
with@versativa/ip
dependency, and published version 1.1.0 under@versatica
NPM organization.sctp
with@versativa/sctp
in mediasoup, so nownpm audit
is ok.Before
After