Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
github.com/Masterminds/semver/v3
The semver
package provides the ability to work with Semantic Versions in Go. Specifically it provides the ability to:
v
prefixNote, import github.com/Masterminds/semver/v3
to use the latest version.
There are three major versions fo the semver
package.
There are two functions that can parse semantic versions. The StrictNewVersion
function only parses valid version 2 semantic versions as outlined in the
specification. The NewVersion
function attempts to coerce a version into a
semantic version and parse it. For example, if there is a leading v or a version
listed without all 3 parts (e.g. v1.2
) it will attempt to coerce it into a valid
semantic version (e.g., 1.2.0). In both cases a Version
object is returned
that can be sorted, compared, and used in constraints.
When parsing a version an error is returned if there is an issue parsing the version. For example,
v, err := semver.NewVersion("1.2.3-beta.1+build345")
The version object has methods to get the parts of the version, compare it to other versions, convert the version back into a string, and get the original string. Getting the original string is useful if the semantic version was coerced into a valid form.
A set of versions can be sorted using the sort
package from the standard library.
For example,
raw := []string{"1.2.3", "1.0", "1.3", "2", "0.4.2",}
vs := make([]*semver.Version, len(raw))
for i, r := range raw {
v, err := semver.NewVersion(r)
if err != nil {
t.Errorf("Error parsing version: %s", err)
}
vs[i] = v
}
sort.Sort(semver.Collection(vs))
There are two methods for comparing versions. One uses comparison methods on
Version
instances and the other uses Constraints
. There are some important
differences to notes between these two methods of comparison.
Compare
, LessThan
,
and others it will follow the specification and always include pre-releases
within the comparison. It will provide an answer that is valid with the
comparison section of the spec at https://semver.org/#spec-item-11-0
in your range.There are differences between the two methods or checking versions because the
comparison methods on Version
follow the specification while comparison ranges
are not part of the specification. Different packages and tools have taken it
upon themselves to come up with range rules. This has resulted in differences.
For example, npm/js and Cargo/Rust follow similar patterns while PHP has a
different pattern for ^. The comparison features in this package follow the
npm/js and Cargo/Rust lead because applications using it have followed similar
patters with their versions.
Checking a version against version constraints is one of the most featureful parts of the package.
c, err := semver.NewConstraint(">= 1.2.3")
if err != nil {
// Handle constraint not being parsable.
}
v, err := semver.NewVersion("1.3")
if err != nil {
// Handle version not being parsable.
}
// Check if the version meets the constraints. The variable a will be true.
a := c.Check(v)
There are two elements to the comparisons. First, a comparison string is a list
of space or comma separated AND comparisons. These are then separated by || (OR)
comparisons. For example, ">= 1.2 < 3.0.0 || >= 4.2.3"
is looking for a
comparison that's greater than or equal to 1.2 and less than 3.0.0 or is
greater than or equal to 4.2.3.
The basic comparisons are:
=
: equal (aliased to no operator)!=
: not equal>
: greater than<
: less than>=
: greater than or equal to<=
: less than or equal toPre-releases, for those not familiar with them, are used for software releases
prior to stable or generally available releases. Examples of pre-releases include
development, alpha, beta, and release candidate releases. A pre-release may be
a version such as 1.2.3-beta.1
while the stable release would be 1.2.3
. In the
order of precedence, pre-releases come before their associated releases. In this
example 1.2.3-beta.1 < 1.2.3
.
According to the Semantic Version specification, pre-releases may not be API compliant with their release counterpart. It says,
A pre-release version indicates that the version is unstable and might not satisfy the intended compatibility requirements as denoted by its associated normal version.
SemVer's comparisons using constraints without a pre-release comparator will skip
pre-release versions. For example, >=1.2.3
will skip pre-releases when looking
at a list of releases while >=1.2.3-0
will evaluate and find pre-releases.
The reason for the 0
as a pre-release version in the example comparison is
because pre-releases can only contain ASCII alphanumerics and hyphens (along with
.
separators), per the spec. Sorting happens in ASCII sort order, again per the
spec. The lowest character is a 0
in ASCII sort order
(see an ASCII Table)
Understanding ASCII sort ordering is important because A-Z comes before a-z. That
means >=1.2.3-BETA
will return 1.2.3-alpha
. What you might expect from case
sensitivity doesn't apply here. This is due to ASCII sort ordering which is what
the spec specifies.
There are multiple methods to handle ranges and the first is hyphens ranges. These look like:
1.2 - 1.4.5
which is equivalent to >= 1.2 <= 1.4.5
2.3.4 - 4.5
which is equivalent to >= 2.3.4 <= 4.5
Note that 1.2-1.4.5
without whitespace is parsed completely differently; it's
parsed as a single constraint 1.2.0
with prerelease 1.4.5
.
The x
, X
, and *
characters can be used as a wildcard character. This works
for all comparison operators. When used on the =
operator it falls
back to the patch level comparison (see tilde below). For example,
1.2.x
is equivalent to >= 1.2.0, < 1.3.0
>= 1.2.x
is equivalent to >= 1.2.0
<= 2.x
is equivalent to < 3
*
is equivalent to >= 0.0.0
The tilde (~
) comparison operator is for patch level ranges when a minor
version is specified and major level changes when the minor number is missing.
For example,
~1.2.3
is equivalent to >= 1.2.3, < 1.3.0
~1
is equivalent to >= 1, < 2
~2.3
is equivalent to >= 2.3, < 2.4
~1.2.x
is equivalent to >= 1.2.0, < 1.3.0
~1.x
is equivalent to >= 1, < 2
The caret (^
) comparison operator is for major level changes once a stable
(1.0.0) release has occurred. Prior to a 1.0.0 release the minor versions acts
as the API stability level. This is useful when comparisons of API versions as a
major change is API breaking. For example,
^1.2.3
is equivalent to >= 1.2.3, < 2.0.0
^1.2.x
is equivalent to >= 1.2.0, < 2.0.0
^2.3
is equivalent to >= 2.3, < 3
^2.x
is equivalent to >= 2.0.0, < 3
^0.2.3
is equivalent to >=0.2.3 <0.3.0
^0.2
is equivalent to >=0.2.0 <0.3.0
^0.0.3
is equivalent to >=0.0.3 <0.0.4
^0.0
is equivalent to >=0.0.0 <0.1.0
^0
is equivalent to >=0.0.0 <1.0.0
In addition to testing a version against a constraint, a version can be validated against a constraint. When validation fails a slice of errors containing why a version didn't meet the constraint is returned. For example,
c, err := semver.NewConstraint("<= 1.2.3, >= 1.4")
if err != nil {
// Handle constraint not being parseable.
}
v, err := semver.NewVersion("1.3")
if err != nil {
// Handle version not being parseable.
}
// Validate a version against a constraint.
a, msgs := c.Validate(v)
// a is false
for _, m := range msgs {
fmt.Println(m)
// Loops over the errors which would read
// "1.3 is greater than 1.2.3"
// "1.3 is less than 1.4"
}
If you find an issue or want to contribute please file an issue or create a pull request.
Security is an important consideration for this project. The project currently uses the following tools to help discover security issues:
If you believe you have found a security vulnerability you can privately disclose it through the GitHub security page.
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.