Date: Tue, 21 Sep 2021 20:28:29 GMT From: "Bradley T. Hughes" <bhughes@FreeBSD.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org Subject: git: 8c3ca5e4b368 - main - security/vuxml: document Node.js July 2021 Security Releases Message-ID: <202109212028.18LKSTs0073816@gitrepo.freebsd.org>
next in thread | raw e-mail | index | archive | help
The branch main has been updated by bhughes: URL: https://cgit.FreeBSD.org/ports/commit/?id=8c3ca5e4b36800a563559fc60bd6bcca0339b5cb commit 8c3ca5e4b36800a563559fc60bd6bcca0339b5cb Author: Bradley T. Hughes <bhughes@FreeBSD.org> AuthorDate: 2021-09-21 19:34:38 +0000 Commit: Bradley T. Hughes <bhughes@FreeBSD.org> CommitDate: 2021-09-21 20:26:35 +0000 security/vuxml: document Node.js July 2021 Security Releases https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/ Sponsored by: Miles AS --- security/vuxml/vuln-2021.xml | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 78428bf81fae..660af90cfa8f 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,43 @@ + <vuln vid="c174118e-1b11-11ec-9d9d-0022489ad614"> + <topic>Node.js -- July 2021 Security Releases</topic> + <affects> + <package> + <name>node14</name> + <range><lt>14.17.2</lt></range> + </package> + <package> + <name>node</name> + <range><lt>16.4.1</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Node.js reports:</p> + <blockquote cite="https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/"> + <h1>libuv upgrade - Out of bounds read (Medium) (CVE-2021-22918)</h1> + <p>Node.js is vulnerable to out-of-bounds read in libuv's uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes.</p> + <h1>Windows installer - Node Installer Local Privilege Escalation (Medium) (CVE-2021-22921)</h1> + <p>Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.</p> + <h1>npm upgrade - ssri Regular Expression Denial of Service (ReDoS) (High) (CVE-2021-27290)</h1> + <p>This is a vulnerability in the ssri npm module which may be vulnerable to denial of service attacks.</p> + <h1>npm upgrade - hosted-git-info Regular Expression Denial of Service (ReDoS) (Medium) (CVE-2021-23362)</h1> + <p>This is a vulnerability in the hosted-git-info npm module which may be vulnerable to denial of service attacks.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2021-22918</cvename> + <cvename>CVE-2021-22921</cvename> + <cvename>CVE-2021-27290</cvename> + <cvename>CVE-2021-23362</cvename> + <url>https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/</url> + </references> + <dates> + <discovery>2021-07-01</discovery> + <entry>2021-09-21</entry> + </dates> + </vuln> + <vuln vid="3551e106-1b17-11ec-a8a7-704d7b472482"> <topic>chromium -- multiple vulnerabilities</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202109212028.18LKSTs0073816>