Sylvain Beucler pushed to branch master at Debian Security Tracker /
security-tracker
Commits:
d54a9c94 by Sylvain Beucler at 2022-10-04T19:47:42+02:00
CVE-2021-44531,CVE-2021-44532,CVE-2021-44533/nodejs: buster ignored + add
references
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -62969,20 +62969,27 @@ CVE-2021-44534
CVE-2021-44533 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and <
17.3.1 did ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
+ [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon
CA, invasive/hard to backport)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by
security support)
NOTE:
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
+ NOTE: https://hackerone.com/reports/1429694
NOTE:
https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1
(v12.x)
CVE-2021-44532 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and <
17.3.1 conv ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
+ [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon
CA, invasive/hard to backport)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by
security support)
NOTE:
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
+ NOTE: https://hackerone.com/reports/1429694
NOTE:
https://github.com/nodejs/node/commit/19873abfb24dce75ffff042efe76dc5633052677
(v12.x)
+ NOTE:
https://github.com/nodejs/node/commit/a5c7843cab6fdb9c845edadc2a7b9b30e02c8bf2
(v12.x)
CVE-2021-44531 (Accepting arbitrary Subject Alternative Name (SAN) types,
unless a PKI ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
+ [buster] - nodejs <ignored> (Minor issue, requires MITM and uncommon
CA, invasive/hard to backport)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by
security support)
NOTE:
https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
+ NOTE: https://hackerone.com/reports/1429694
NOTE:
https://github.com/nodejs/node/commit/e0fe6a635e5929a364986a6c39dc3585b9ddcd85
(v12.x)
NOTE:
https://github.com/nodejs/node/commit/a5c7843cab6fdb9c845edadc2a7b9b30e02c8bf2
(v12.x)
CVE-2021-44530 (An injection vulnerability exists in a third-party library
used in Uni ...)
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d54a9c94a605d03b6a15482f8033153f6bb66016
--
View it on GitLab:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/d54a9c94a605d03b6a15482f8033153f6bb66016
You're receiving this email because of your account on salsa.debian.org.
_______________________________________________
debian-security-tracker-commits mailing list
[email protected]
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/debian-security-tracker-commits