[Git][security-tracker-team/security-tracker][master] Revert "Bulk added EOL for 12 CVEs for nodejs in buster LTS."

Salvatore Bonaccorso (@carnil) carnil at debian.org
Tue Jul 12 05:10:24 BST 2022



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
70e33276 by Salvatore Bonaccorso at 2022-07-12T06:09:25+02:00
Revert "Bulk added EOL for 12 CVEs for nodejs in buster LTS."

This reverts commit 22d9f630a6c2f2a80db5b748c40aea24d931cac3.

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -8600,7 +8600,6 @@ CVE-2022-32216
 CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding]
 	RESERVED
 	- nodejs <unfixed>
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	- llhttp <itp> (bug #977716)
 	NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
 	NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8608,7 +8607,6 @@ CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfe
 CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
 	RESERVED
 	- nodejs <unfixed>
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	- llhttp <itp> (bug #977716)
 	NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
 	NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8616,7 +8614,6 @@ CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
 CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
 	RESERVED
 	- nodejs <unfixed>
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	- llhttp <itp> (bug #977716)
 	NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
 	NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8624,7 +8621,6 @@ CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
 CVE-2022-32212
 	RESERVED
 	- nodejs <unfixed>
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212
 	NOTE: https://github.com/nodejs/node/commit/48c5aa5cab718d04473fa2761d532657c84b8131 (v14.x)
 	NOTE: https://github.com/nodejs/node/commit/1aa5036c31ac2a9b2a2528af454675ad412f1464 (main)
@@ -44969,7 +44965,6 @@ CVE-2021-44535
 CVE-2022-21824 (Due to the formatting logic of the "console.table()" function it was n ...)
 	{DSA-5170-1}
 	- nodejs 12.22.9~dfsg-1 (bug #1004177)
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824
 	NOTE: https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)
@@ -44978,21 +44973,18 @@ CVE-2021-44534
 CVE-2021-44533 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did  ...)
 	{DSA-5170-1}
 	- nodejs 12.22.9~dfsg-1 (bug #1004177)
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
 	NOTE: https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1 (v12.x)
 CVE-2021-44532 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 conv ...)
 	{DSA-5170-1}
 	- nodejs 12.22.9~dfsg-1 (bug #1004177)
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
 	NOTE: https://github.com/nodejs/node/commit/19873abfb24dce75ffff042efe76dc5633052677 (v12.x)
 CVE-2021-44531 (Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI ...)
 	{DSA-5170-1}
 	- nodejs 12.22.9~dfsg-1 (bug #1004177)
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
 	NOTE: https://github.com/nodejs/node/commit/e0fe6a635e5929a364986a6c39dc3585b9ddcd85 (v12.x)
@@ -103243,13 +103235,11 @@ CVE-2021-22961 (A code injection vulnerability exists within the firewall softwa
 CVE-2021-22960 (The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk  ...)
 	{DSA-5170-1}
 	- nodejs 12.22.7~dfsg-1
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-when-parsing-the-body-medium-cve-2021-22960
 CVE-2021-22959 (The parser in accepts requests with a space (SP) right after the heade ...)
 	{DSA-5170-1}
 	- nodejs 12.22.7~dfsg-1
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-due-to-spaced-in-headers-medium-cve-2021-22959
 CVE-2021-22958 (A Server-Side Request Forgery vulnerability was found in concrete5 &lt ...)
@@ -103317,7 +103307,6 @@ CVE-2021-22940 (Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a u
 CVE-2021-22939 (If the Node.js https API was used incorrectly and "undefined" was in p ...)
 	- nodejs 12.22.5~dfsg-1
 	[bullseye] - nodejs 12.22.5~dfsg-2~11u1
-	[buster] - nodejs <end-of-life> (No longer supported in LTS buster)
 	[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/#incomplete-validation-of-rejectunauthorized-parameter-low-cve-2021-22939
 CVE-2021-22938 (A vulnerability in Pulse Connect Secure before 9.1R12 could allow an a ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/70e33276722f2724adb07654cd31d544bca896f5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/70e33276722f2724adb07654cd31d544bca896f5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220712/3d7e72c1/attachment.htm>


More information about the debian-security-tracker-commits mailing list