MGASA-2021-0372

Source
https://advisories.mageia.org/MGASA-2021-0372.html
Import Source
https://advisories.mageia.org/MGASA-2021-0372.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0372
Related
Published
2021-07-25T14:45:06Z
Modified
2021-07-25T14:24:25Z
Summary
Updated nodejs packages fix security vulnerabilities
Details

This affects the package y18n before 3.2.2, 4.0.1 and 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('proto'); y18n.updateLocale({polluted: true}); console.log(polluted); // true (CVE-2020-7774).

The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity (CVE-2021-23362).

ssri 5.2.2-8.0.0, fixed in 8.0.1, processes SRIs using a regular expression which is vulnerable to a denial of service. Malicious SRIs could take an extremely long time to process, leading to denial of service. This issue only affects consumers using the strict option (CVE-2021-27290).

Theses issues are fixed by upgrading nodejs packages to latest available LTS 14.17.3 version. See upstream releases notes for other included bugfixes.

References
Credits

Affected packages

Mageia:8 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/mageia/nodejs?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.17.3-1.mga8

Ecosystem specific

{
    "section": "core"
}