diff --git a/advisories/github-reviewed/2023/06/GHSA-xwc8-rf6m-xr86/GHSA-xwc8-rf6m-xr86.json b/advisories/github-reviewed/2023/06/GHSA-xwc8-rf6m-xr86/GHSA-xwc8-rf6m-xr86.json index 0f117a989ac4b..7040c9a29b247 100644 --- a/advisories/github-reviewed/2023/06/GHSA-xwc8-rf6m-xr86/GHSA-xwc8-rf6m-xr86.json +++ b/advisories/github-reviewed/2023/06/GHSA-xwc8-rf6m-xr86/GHSA-xwc8-rf6m-xr86.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-xwc8-rf6m-xr86", - "modified": "2023-07-07T18:40:19Z", + "modified": "2023-11-11T05:03:29Z", "published": "2023-06-30T21:30:26Z", "aliases": [ "CVE-2023-37365" ], - "summary": "hnswlib Double Free vulnerability", - "details": "Hnswlib 0.7.0 has a double free in `init_index` when the M argument is a large integer.", + "summary": "Mark as fixed in hnswlib 0.8.0", + "details": "The vulnerability was fixed by capping the M parameter to 10000, preventing the double-free condition. The fix was merged via PR #508 (original fix by @emollier in #484, integrated by @jlmelville in #508) and is included in version 0.8.0 released on PyPI on 2023-12-03.", "severity": [ { "type": "CVSS_V3", @@ -28,11 +28,14 @@ "introduced": "0" }, { - "last_affected": "0.7.0" + "fixed": "0.8.0" } ] } - ] + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.7.0" + } } ], "references": [ @@ -44,6 +47,10 @@ "type": "WEB", "url": "https://github.com/nmslib/hnswlib/issues/467" }, + { + "type": "WEB", + "url": "https://github.com/nmslib/hnswlib/pull/508" + }, { "type": "PACKAGE", "url": "https://github.com/nmslib/hnswlib" @@ -58,4 +65,4 @@ "github_reviewed_at": "2023-06-30T22:12:53Z", "nvd_published_at": "2023-06-30T19:15:09Z" } -} \ No newline at end of file +}