CVE-2024-46993
Description
Electron is an open source framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. In versions prior to 28.3.2, 29.3.3, and 30.0.3, the nativeImage.createFromPath() and nativeImage.createFromBuffer() functions call a function downstream that is vulnerable to a heap buffer overflow. An Electron program that uses either of the affected functions is vulnerable to a buffer overflow if an attacker is in control of the image's height, width, and contents. This issue has been patched in versions 28.3.2, 29.3.3, and 30.0.3. There are no workarounds for this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
electronnpm | < 28.3.2 | 28.3.2 |
electronnpm | >= 29.0.0-alpha.1, < 29.3.3 | 29.3.3 |
electronnpm | >= 30.0.0-alpha.1, < 30.0.3 | 30.0.3 |
Affected products
1- Range: v0.1.0, v0.1.1, v0.1.2, …
Patches
3db688056d8d44517547f07f68969189a7235Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
3News mentions
0No linked articles in our index yet.