[Git][security-tracker-team/security-tracker][master] Revert "Bulk added EOL for 12 CVEs for nodejs in buster LTS."
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Tue Jul 12 05:10:24 BST 2022
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
70e33276 by Salvatore Bonaccorso at 2022-07-12T06:09:25+02:00
Revert "Bulk added EOL for 12 CVEs for nodejs in buster LTS."
This reverts commit 22d9f630a6c2f2a80db5b748c40aea24d931cac3.
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -8600,7 +8600,6 @@ CVE-2022-32216
CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfer-Encoding]
RESERVED
- nodejs <unfixed>
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
- llhttp <itp> (bug #977716)
NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-incorrect-parsing-of-multi-line-transfer-encoding-medium-cve-2022-32215
NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8608,7 +8607,6 @@ CVE-2022-32215 [HTTP Request Smuggling - Incorrect Parsing of Multi-line Transfe
CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
RESERVED
- nodejs <unfixed>
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
- llhttp <itp> (bug #977716)
NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-improper-delimiting-of-header-fields-medium-cve-2022-32214
NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8616,7 +8614,6 @@ CVE-2022-32214 [HTTP Request Smuggling - Improper Delimiting of Header Fields]
CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
RESERVED
- nodejs <unfixed>
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
- llhttp <itp> (bug #977716)
NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#http-request-smuggling-flawed-parsing-of-transfer-encoding-medium-cve-2022-32213
NOTE: https://github.com/nodejs/node/commit/da0fda0fe81d372e24c0cb11aec37534985708dd (v14.x)
@@ -8624,7 +8621,6 @@ CVE-2022-32213 [HTTP Request Smuggling - Flawed Parsing of Transfer-Encoding]
CVE-2022-32212
RESERVED
- nodejs <unfixed>
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
NOTE: https://nodejs.org/en/blog/vulnerability/july-2022-security-releases/#dns-rebinding-in-inspect-via-invalid-ip-addresses-high-cve-2022-32212
NOTE: https://github.com/nodejs/node/commit/48c5aa5cab718d04473fa2761d532657c84b8131 (v14.x)
NOTE: https://github.com/nodejs/node/commit/1aa5036c31ac2a9b2a2528af454675ad412f1464 (main)
@@ -44969,7 +44965,6 @@ CVE-2021-44535
CVE-2022-21824 (Due to the formatting logic of the "console.table()" function it was n ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#prototype-pollution-via-console-table-properties-low-cve-2022-21824
NOTE: https://github.com/nodejs/node/commit/be69403528da99bf3df9e1dc47186f18ba59cb5e (v12.x)
@@ -44978,21 +44973,18 @@ CVE-2021-44534
CVE-2021-44533 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 did ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#incorrect-handling-of-certificate-subject-and-issuer-fields-medium-cve-2021-44533
NOTE: https://github.com/nodejs/node/commit/8c2db2c86baff110a1d905ed1e0dd4e1c4fd2dd1 (v12.x)
CVE-2021-44532 (Node.js < 12.22.9, < 14.18.3, < 16.13.2, and < 17.3.1 conv ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#certificate-verification-bypass-via-string-injection-medium-cve-2021-44532
NOTE: https://github.com/nodejs/node/commit/19873abfb24dce75ffff042efe76dc5633052677 (v12.x)
CVE-2021-44531 (Accepting arbitrary Subject Alternative Name (SAN) types, unless a PKI ...)
{DSA-5170-1}
- nodejs 12.22.9~dfsg-1 (bug #1004177)
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/jan-2022-security-releases/#improper-handling-of-uri-subject-alternative-names-medium-cve-2021-44531
NOTE: https://github.com/nodejs/node/commit/e0fe6a635e5929a364986a6c39dc3585b9ddcd85 (v12.x)
@@ -103243,13 +103235,11 @@ CVE-2021-22961 (A code injection vulnerability exists within the firewall softwa
CVE-2021-22960 (The parse function in llhttp < 2.1.4 and < 6.0.6. ignores chunk ...)
{DSA-5170-1}
- nodejs 12.22.7~dfsg-1
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-when-parsing-the-body-medium-cve-2021-22960
CVE-2021-22959 (The parser in accepts requests with a space (SP) right after the heade ...)
{DSA-5170-1}
- nodejs 12.22.7~dfsg-1
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-due-to-spaced-in-headers-medium-cve-2021-22959
CVE-2021-22958 (A Server-Side Request Forgery vulnerability was found in concrete5 < ...)
@@ -103317,7 +103307,6 @@ CVE-2021-22940 (Node.js before 16.6.1, 14.17.5, and 12.22.5 is vulnerable to a u
CVE-2021-22939 (If the Node.js https API was used incorrectly and "undefined" was in p ...)
- nodejs 12.22.5~dfsg-1
[bullseye] - nodejs 12.22.5~dfsg-2~11u1
- [buster] - nodejs <end-of-life> (No longer supported in LTS buster)
[stretch] - nodejs <end-of-life> (Nodejs in stretch not covered by security support)
NOTE: https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/#incomplete-validation-of-rejectunauthorized-parameter-low-cve-2021-22939
CVE-2021-22938 (A vulnerability in Pulse Connect Secure before 9.1R12 could allow an a ...)
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/70e33276722f2724adb07654cd31d544bca896f5
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/70e33276722f2724adb07654cd31d544bca896f5
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220712/3d7e72c1/attachment.htm>
More information about the debian-security-tracker-commits
mailing list