[Git][security-tracker-team/security-tracker][master] nodejs: stretch end-of-life

Sylvain Beucler (@beuc) beuc at debian.org
Tue Jan 11 16:12:09 GMT 2022



Sylvain Beucler pushed to branch master at Debian Security Tracker / security-tracker


Commits:
c979c9a6 by Sylvain Beucler at 2022-01-11T17:11:51+01:00
nodejs: stretch end-of-life

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -7658,21 +7658,25 @@ CVE-2021-44535
 CVE-2021-44534 [Prototype pollution via console.table properties]
 	RESERVED
 	- nodejs <unfixed>
+	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824
 	NOTE: https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)
 CVE-2021-44533 [Incorrect handling of certificate subject and issuer fields]
 	RESERVED
 	- nodejs <unfixed>
+	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
 	NOTE: https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1 (v12.x)
 CVE-2021-44532 [Certificate Verification Bypass via String Injection]
 	RESERVED
 	- nodejs <unfixed>
+	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
 	NOTE: https://github.com/nodejs/node/commit/19873abfb24dce75ffff042efe76dc5633052677 (v12.x)
 CVE-2021-44531 [Improper handling of URI Subject Alternative Names]
 	RESERVED
 	- nodejs <unfixed>
+	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
 	NOTE: https://github.com/nodejs/node/commit/e0fe6a635e5929a364986a6c39dc3585b9ddcd85 (v12.x)
 	NOTE: https://github.com/nodejs/node/commit/a5c7843cab6fdb9c845edadc2a7b9b30e02c8bf2 (v12.x)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c979c9a69475bdc58a8b3ffa08fff346fd5c3d90

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/c979c9a69475bdc58a8b3ffa08fff346fd5c3d90
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220111/70b12ebf/attachment.htm>


More information about the debian-security-tracker-commits mailing list