Sylvain Beucler pushed to branch master at Debian Security Tracker / 
security-tracker


Commits:
d54a9c94 by Sylvain Beucler at 2022-10-04T19:47:42+02:00
CVE-2021-44531,CVE-2021-44532,CVE-2021-44533/nodejs: buster ignored + add 
references

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -62969,20 +62969,27 @@ CVE-2021-44534
 CVE-2021-44533 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 
17.3.1 did  ...)
        {DSA-5170-1}
        - nodejs 12.22.9~dfsg-1 (bug #1004177)
+       [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon 
CA, invasive/hard to backport)
        [stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by 
security support)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
+       NOTE: https://hackerone.com/reports/1429694
        NOTE: 
https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1 
(v12.x)
 CVE-2021-44532 (Node.js &lt; 12.22.9, &lt; 14.18.3, &lt; 16.13.2, and &lt; 
17.3.1 conv ...)
        {DSA-5170-1}
        - nodejs 12.22.9~dfsg-1 (bug #1004177)
+       [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon 
CA, invasive/hard to backport)
        [stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by 
security support)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
+       NOTE: https://hackerone.com/reports/1429694
        NOTE: 
https://github.com/nodejs/node/commit/19873abfb24dce75ffff042efe76dc5633052677 
(v12.x)
+       NOTE: 
https://github.com/nodejs/node/commit/a5c7843cab6fdb9c845edadc2a7b9b30e02c8bf2 
(v12.x)
 CVE-2021-44531 (Accepting arbitrary Subject Alternative Name (SAN) types, 
unless a PKI ...)
        {DSA-5170-1}
        - nodejs 12.22.9~dfsg-1 (bug #1004177)
+       [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon 
CA, invasive/hard to backport)
        [stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by 
security support)
        NOTE: 
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
+       NOTE: https://hackerone.com/reports/1429694
        NOTE: 
https://github.com/nodejs/node/commit/e0fe6a635e5929a364986a6c39dc3585b9ddcd85 
(v12.x)
        NOTE: 
https://github.com/nodejs/node/commit/a5c7843cab6fdb9c845edadc2a7b9b30e02c8bf2 
(v12.x)
 CVE-2021-44530 (An injection vulnerability exists in a third-party library 
used in Uni ...)



View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d54a9c94a605d03b6a15482f8033153f6bb66016

-- 
View it on GitLab: 
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d54a9c94a605d03b6a15482f8033153f6bb66016
You're receiving this email because of your account on salsa.debian.org.


_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits

Reply via email to