redis-browser
redis-browser copied to clipboard
[Security] Bump electron from 2.0.18 to 9.4.0
Bumps electron from 2.0.18 to 9.4.0. This update includes security fixes.
Vulnerabilities fixed
Sourced from The GitHub Security Advisory Database.
Arbitrary file read via window-open IPC in Electron
Impact
The vulnerability allows arbitrary local file read by defining unsafe window options on a child window opened via window.open.
Workarounds
Ensure you are calling
event.preventDefault()on allnew-windowevents where theurloroptionsis not something you expect.Fixed Versions
9.0.0-beta.218.2.47.2.4For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Affected versions: < 7.2.4
Sourced from The GitHub Security Advisory Database.
Context isolation bypass via contextBridge in Electron
Impact
Apps using both
contextIsolationandcontextBridgeare affected.This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
Fixed Versions
9.0.0-beta.218.2.47.2.4For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Affected versions: < 7.2.4
Sourced from The GitHub Security Advisory Database.
Context isolation bypass via leaked cross-context objects in Electron
Impact
Apps using
contextIsolationare affected.This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
Fixed Versions
9.0.0-beta.218.2.47.2.4Non-Impacted Versions
9.0.0-beta.*For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Affected versions: < 7.2.4
Sourced from The GitHub Security Advisory Database.
Context isolation bypass via Promise in Electron
Impact
Apps using
contextIsolationare affected.This is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions.
Workarounds
There are no app-side workarounds, you must update your Electron version to be protected.
Fixed Versions
9.0.0-beta.218.2.47.2.46.1.11For more information
If you have any questions or comments about this advisory:
- Email us at [email protected]
Affected versions: < 6.1.11
Sourced from The GitHub Security Advisory Database.
IPC messages delivered to the wrong frame in Electron
Impact
IPC messages sent from the main process to a subframe in the renderer process, through
webContents.sendToFrame,event.replyor when using theremotemodule, can in some cases be delivered to the wrong frame.If your app does ANY of the following, then it is impacted by this issue:
- Uses
remote- Calls
webContents.sendToFrame- Calls
event.replyin an IPC message handlerPatches
This has been fixed in the following versions:
- 9.4.0
- 10.2.0
- 11.1.0
- 12.0.0-beta.9
Workarounds
There are no workarounds for this issue.
For more information
... (truncated)
Affected versions: < 9.4.0
Release notes
Sourced from electron's releases.
electron v9.4.0
Release Notes for v9.4.0
Fixes
- Added Electron DLLs like libGLESv2.dll to symbol server. #26967 (Also in 10, 11, 12)
- Fixed
systemPreferences.effectiveAppearancereturningsystemPreferences.getAppLevelAppearance(). #26881 (Also in 10, 11, 12)- Fixed an issue where
event.replycould sometimes not deliver a reply to an IPC message when cross-site iframes were present. #26928 (Also in 10, 11, 12)- Fixed an issue where some buttons were un-clickable in some BrowserViews with draggable regions enabled. #26745 (Also in 10, 11)
- Fixed an issue whereby a corrupted
async_hooksstack would crash the renderer when throwing some errors in the renderer process. #26748 (Also in 10, 11)- Fixed an occasional crash on Windows related to NativeViewHost::SetParentAccessible. #26950 (Also in 10, 11, 12)
- Fixed usage of --disable-dev-shm-usage for apps using --no-sandbox on linux. #26806
Other Changes
- Backported the fix to CVE-2020-16024: Heap buffer overflow in UI. #26831
- Security: backport fix for 1150649. #26897
- Security: backported fix for 1137603. #26893
- Security: backported fix for 1141350. #26895
- Security: backported the fix to CVE-2020-16014: Use after free in PPAPI. #26856
- Security: backported the fix to CVE-2020-16015: Insufficient data validation in WASM. #26859
- Security: backported the fix to CVE-2020-16022: Insufficient policy enforcement in networking. #26861
electron v9.3.5
Release Notes for v9.3.5
Fixes
- Fixed
<webview>render-process-goneevent dispatch. #26576- Fixed
LC_ALLenvironment variable getting changed in Electron. #26508 (Also in 10, 11)- Fixed debug.log files being created under working directory on windows. #26267 (Also in 10)
- Fixed draggable regions stops working when devtools is opened on macOS. #26506 (Also in 10, 11)
Other Changes
- Backported the fix to CVE-2020-16017: Browser UAF when detaching a provisional frame. #26477
- Fixed value of
getSystemVersion()on Big Sur. #26430- Security: backported fix for 1143772. #26400
- Security: backported fix for 1144489. #26397
- Security: backported fix for chromium:1133527. #26412
- Security: backported fix for chromium:1137608. #26409
- Security: backported fix for chromium:1139398. #26406
Unknown
electron v9.3.4
Release Notes for v9.3.4
Fixes
... (truncated)
Commits
f37c1ffBump v9.4.05c8e7e8fix: restrict sendToFrame to same-process frames by default (#26928)36b1f8ffix: Upload all *.dll.pdb to symbol server (#26967)e83bd9bfix: Avoid crashing in NativeViewHost::SetParentAccessible on Windows 10 (#26...c2136b6chore: cherry-pick 290fe9c6e245 from v8 (#26897)a574285chore: cherry-pick 3abc372c9c00 from chromium (#26895)559c008chore: cherry-pick d8d64b7cd244 from chromium (#26893)2d41c02chore: cherry-pick ecdec1fb0f42 from chromium (#26867)662810fchore: cherry-pick bbc6ab5bb49c from chromium (#26861)0065e3dfix: Propagate --disable-dev-shm-usage to child processes (#26806)- Additional commits viewable in compare view
Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.
Dependabot commands and options
You can trigger Dependabot actions by commenting on this PR:
@dependabot rebasewill rebase this PR@dependabot recreatewill recreate this PR, overwriting any edits that have been made to it@dependabot mergewill merge this PR after your CI passes on it@dependabot squash and mergewill squash and merge this PR after your CI passes on it@dependabot cancel mergewill cancel a previously requested merge and block automerging@dependabot reopenwill reopen this PR if it is closed@dependabot closewill close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually@dependabot ignore this major versionwill close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this minor versionwill close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)@dependabot ignore this dependencywill close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)@dependabot use these labelswill set the current labels as the default for future PRs for this repo and language@dependabot use these reviewerswill set the current reviewers as the default for future PRs for this repo and language@dependabot use these assigneeswill set the current assignees as the default for future PRs for this repo and language@dependabot use this milestonewill set the current milestone as the default for future PRs for this repo and language@dependabot badge mewill comment on this PR with code to add a "Dependabot enabled" badge to your readme
Additionally, you can set the following in your Dependabot dashboard:
- Update frequency (including time of day and day of week)
- Pull request limits (per update run and/or open at any time)
- Automerge options (never/patch/minor, and dev/runtime dependencies)
- Out-of-range updates (receive only lockfile updates, if desired)
- Security updates (receive only security updates, if desired)