[Git][security-tracker-team/security-tracker][master] lts: node-url-parse EOL in stretch

Emilio Pozuelo Monfort (@pochu) pochu at debian.org
Tue Mar 8 13:44:10 GMT 2022



Emilio Pozuelo Monfort pushed to branch master at Debian Security Tracker / security-tracker


Commits:
62e191e6 by Emilio Pozuelo Monfort at 2022-03-08T14:16:49+01:00
lts: node-url-parse EOL in stretch

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -3226,6 +3226,7 @@ CVE-2022-0692 (Open Redirect on Rudloff/alltube in Packagist rudloff/alltube pri
 	NOT-FOR-US: alltube
 CVE-2022-0691 (Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...)
 	- node-url-parse 1.5.9+~1.4.8-1
+	[stretch] - node-url-parse <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4
 	NOTE: https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63 (1.5.9)
 CVE-2022-25369
@@ -3242,6 +3243,7 @@ CVE-2022-0687
 	RESERVED
 CVE-2022-0686 (Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...)
 	- node-url-parse 1.5.9+~1.4.8-1
+	[stretch] - node-url-parse <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c
 	NOTE: https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5 (1.5.8)
 CVE-2022-0685 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior  ...)
@@ -3659,6 +3661,7 @@ CVE-2022-0639 (Authorization Bypass Through User-Controlled Key in NPM url-parse
 	- node-url-parse 1.5.7-1
 	[bullseye] - node-url-parse <no-dsa> (Minor issue)
 	[buster] - node-url-parse <no-dsa> (Minor issue)
+	[stretch] - node-url-parse <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155
 	NOTE: https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788 (1.5.7)
 CVE-2022-0638 (Cross-Site Request Forgery (CSRF) in Packagist microweber/microweber p ...)
@@ -5867,6 +5870,7 @@ CVE-2022-0512 (Authorization Bypass Through User-Controlled Key in NPM url-parse
 	- node-url-parse 1.5.7-1
 	[bullseye] - node-url-parse <no-dsa> (Minor issue)
 	[buster] - node-url-parse <no-dsa> (Minor issue)
+	[stretch] - node-url-parse <end-of-life> (Nodejs in stretch not covered by security support)
 	NOTE: https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b
 	NOTE: https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40 (1.5.6)
 CVE-2022-0511



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62e191e6cd7a73b74f516e9ce78ddf352357aa67

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/62e191e6cd7a73b74f516e9ce78ddf352357aa67
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20220308/8db4a1dc/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list