[Git][security-tracker-team/security-tracker][master] Add initial tracking for CVEs in nodejs
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Wed Jun 21 11:05:23 BST 2023
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
a2bf113d by Salvatore Bonaccorso at 2023-06-21T12:04:58+02:00
Add initial tracking for CVEs in nodejs
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -6727,24 +6727,45 @@ CVE-2023-30591
RESERVED
CVE-2023-30590
RESERVED
+ - nodejs <unfixed>
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#diffiehellman-do-not-generate-keys-after-setting-a-private-key-medium-cve-2023-30590
CVE-2023-30589
RESERVED
+ - nodejs <unfixed>
+ - llhttp <itp> (bug #977716)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#http-request-smuggling-via-empty-headers-separated-by-cr-medium-cve-2023-30589
CVE-2023-30588
RESERVED
+ - nodejs <unfixed>
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#process-interuption-due-to-invalid-public-key-information-in-x509-certificates-medium-cve-2023-30588
CVE-2023-30587
RESERVED
+ - nodejs <not-affected> (Vulnerable code introduced in 20.x)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#inspector-protocol-bypass-the-experimental-permission-model-high-cve-2023-30587
CVE-2023-30586
RESERVED
+ - nodejs <not-affected> (Vulnerable code introduced in 20.x)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#openssl-engines-can-be-used-to-bypass-the-permission-model-medium-cve-2023-30586
CVE-2023-30585
RESERVED
+ - nodejs <not-affected> (Only affects installation process on Windows)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#privilege-escalation-via-malicious-registry-key-manipulation-during-nodejs-installer-repair-process-medium-cve-2023-30585
CVE-2023-30584
RESERVED
+ - nodejs <not-affected> (Vulnerable code introduced in 20.x)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#path-traversal-bypass-in-experimental-permission-model-high-cve-2023-30584
CVE-2023-30583
RESERVED
+ - nodejs <not-affected> (Vulnerable code introduced in 20.x)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#fsopenasblob-bypass-in-experimental-permission-model-medium-cve-2023-30583
CVE-2023-30582
RESERVED
+ - nodejs <not-affected> (Vulnerable code introduced in 20.x)
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#fswatchfile-bypass-in-experimental-permission-model-medium-cve-2023-30582
CVE-2023-30581
RESERVED
+ - nodejs <unfixed>
+ NOTE: https://nodejs.org/en/blog/vulnerability/june-2023-security-releases#mainmoduleproto-bypass-experimental-policy-mechanism-high-cve-2023-30581
CVE-2023-30580
RESERVED
CVE-2023-30579
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2bf113dd20ee52078cbcecce6f237e308240dcb
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/a2bf113dd20ee52078cbcecce6f237e308240dcb
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230621/94d0424c/attachment.htm>
More information about the debian-security-tracker-commits
mailing list