aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorBradley T. Hughes <bhughes@FreeBSD.org>2021-04-07 05:35:50 +0000
committerBradley T. Hughes <bhughes@FreeBSD.org>2021-04-07 18:58:57 +0000
commit9d9b2b96740807ae005915f3a3d212557b52f1ed (patch)
tree95dedb573ba749361edb1798bfb3bd3941f69825 /security
parentf1e33f7f2bc3b3a2a61cbb64865103a82e1b354c (diff)
downloadports-9d9b2b96740807ae005915f3a3d212557b52f1ed.tar.gz
ports-9d9b2b96740807ae005915f3a3d212557b52f1ed.zip
security/vuxml: document Node.js April 2021 Security Releases
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml47
1 files changed, 47 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4258c7cae6a7..0d7043ae2928 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -76,6 +76,53 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="c0c1834c-9761-11eb-acfd-0022489ad614">
+ <topic>Node.js -- April 2021 Security Releases</topic>
+ <affects>
+ <package>
+ <name>node10</name>
+ <range><lt>10.24.1</lt></range>
+ </package>
+ <package>
+ <name>node12</name>
+ <range><lt>12.22.1</lt></range>
+ </package>
+ <package>
+ <name>node14</name>
+ <range><lt>14.16.1</lt></range>
+ </package>
+ <package>
+ <name>node</name>
+ <range><lt>15.14.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Node.js reports:</p>
+ <blockquote cite="https://nodejs.org/en/blog/vulnerability/april-2021-security-releases/">
+ <h1>OpenSSL - CA certificate check bypass with X509_V_FLAG_X509_STRICT (High) (CVE-2021-3450)</h1>
+ <p>This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt</p>
+ <h1>OpenSSL - NULL pointer deref in signature_algorithms processing (High) (CVE-2021-3449)</h1>
+ <p>This is a vulnerability in OpenSSL which may be exploited through Node.js. You can read more about it in https://www.openssl.org/news/secadv/20210325.txt</p>
+ <h1>npm upgrade - Update y18n to fix Prototype-Pollution (High) (CVE-2020-7774)</h1>
+ <p>This is a vulnerability in the y18n npm module which may be exploited by prototype pollution. You can read more about it in https://github.com/advisories/GHSA-c4w7-xm78-47vh</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nodejs.org/en/blog/vulnerability/april-2021-security-releases/</url>
+ <url>https://www.openssl.org/news/secadv/20210325.txt</url>
+ <url>https://github.com/advisories/GHSA-c4w7-xm78-47vh</url>
+ <cvename>CVE-2021-3450</cvename>
+ <cvename>CVE-2021-3449</cvename>
+ <cvename>CVE-2020-7774</cvename>
+ </references>
+ <dates>
+ <discovery>2021-04-06</discovery>
+ <entry>2021-04-07</entry>
+ </dates>
+ </vuln>
+
<vuln vid="a7b97d26-9792-11eb-b87a-901b0ef719ab">
<topic>FreeBSD -- jail escape possible by mounting over jail root</topic>
<affects>