[Pkg-javascript-devel] Bug#926616: CVE-2018-3750: Prototype Pollution

Jeff Cliff jeffrey.cliff at gmail.com
Sun Apr 7 23:22:00 BST 2019


Package: node-deep-extend
Version: 0.4.1-1
Severity: important

Dear Maintainer,

As per the ubuntu bug report: 

from https://snyk.io/vuln/npm:deep-extend:20180409 :

deep-extend "all the listed modules can be tricked into modifying the prototype of "Object" 
when the attacker control part of the structure passed to these function."

This is verifiably true on at least buster, given the PoC listed in the above URL, but
since it's the same deep-extend in sid, it's probably the same there.

The following commit apparently fixes this: (though I haven't verified that)

https://github.com/unclechu/node-deep-extend/commit/433ee51ed606f4e1867ece57b6ff5a47bebb492f



-- System Information:
Debian Release: buster/sid
  APT prefers testing-debug
  APT policy: (500, 'testing-debug'), (500, 'testing')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_CA.UTF-8, LC_CTYPE=en_CA.UTF-8 (charmap=UTF-8), LANGUAGE=en_CA:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages node-deep-extend depends on:
ii  nodejs  10.15.2~dfsg-1

node-deep-extend recommends no packages.

node-deep-extend suggests no packages.

-- debconf-show failed



More information about the Pkg-javascript-devel mailing list