Skip to content

Commit 8fd34fe

Browse files
authored
vuln: add latest security release vulnerabilities (#1231)
1 parent 559916e commit 8fd34fe

File tree

8 files changed

+64
-0
lines changed

8 files changed

+64
-0
lines changed

vuln/core/131.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2023-46809"],
3+
"vulnerable": "18.x || 20.x || 21.x",
4+
"patched": "^18.19.1 || ^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "A vulnerability in the privateDecrypt() API of the crypto library, allowed a covert timing side-channel during PKCS#1 v1.5 padding error handling.",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/132.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-21891"],
3+
"vulnerable": "20.x || 21.x",
4+
"patched": "^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "Node.js depends on multiple built-in utility functions to normalize paths provided to node:fs functions, which can be overwitten with user-defined implementations leading to filesystem permission model bypass through path traversal attack.",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/133.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-21890"],
3+
"vulnerable": "20.x || 21.x",
4+
"patched": "^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "Improper handling of wildcards in --allow-fs-read and --allow-fs-write",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/134.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-21892"],
3+
"vulnerable": "18.x || 20.x || 21.x",
4+
"patched": "^18.19.1 || ^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "Code injection and privilege escalation through Linux capabilities",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/135.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-22019"],
3+
"vulnerable": "18.x || 20.x || 21.x",
4+
"patched": "^18.19.1 || ^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS).",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/136.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-21896"],
3+
"vulnerable": "20.x || 21.x",
4+
"patched": "^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "The permission model protects itself against path traversal attacks by calling path.resolve() on any paths given by the user. If the path is to be treated as a Buffer, the implementation uses Buffer.from() to obtain a Buffer from the result of path.resolve().",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/137.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-22017"],
3+
"vulnerable": "20.x || 21.x",
4+
"patched": "^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "setuid() does not affect libuv's internal io_uring operations if initialized before the call to setuid(). This allows the process to perform privileged operations despite presumably having dropped such privileges through a call to setuid()",
7+
"affectedEnvironments": ["all"]
8+
}

vuln/core/138.json

+8
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,8 @@
1+
{
2+
"cve": ["CVE-2024-22025"],
3+
"vulnerable": "18.x || 20.x || 21.x",
4+
"patched": "^18.19.1 || ^20.11.1 || ^21.6.2",
5+
"ref": "https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/",
6+
"overview": "A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL.",
7+
"affectedEnvironments": ["all"]
8+
}

0 commit comments

Comments
 (0)