From owner-dev-commits-ports-all@freebsd.org Tue Sep 21 20:28:30 2021 Return-Path: Delivered-To: dev-commits-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1B89967A4DB; Tue, 21 Sep 2021 20:28:30 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4HDY0Y6QdRz4V4n; Tue, 21 Sep 2021 20:28:29 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BAF6D2938; Tue, 21 Sep 2021 20:28:29 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.16.1/8.16.1) with ESMTP id 18LKSTQ8073817; Tue, 21 Sep 2021 20:28:29 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.16.1/8.16.1/Submit) id 18LKSTs0073816; Tue, 21 Sep 2021 20:28:29 GMT (envelope-from git) Date: Tue, 21 Sep 2021 20:28:29 GMT Message-Id: <202109212028.18LKSTs0073816@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: "Bradley T. Hughes" Subject: git: 8c3ca5e4b368 - main - security/vuxml: document Node.js July 2021 Security Releases MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: bhughes X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: 8c3ca5e4b36800a563559fc60bd6bcca0339b5cb Auto-Submitted: auto-generated X-BeenThere: dev-commits-ports-all@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Commit messages for all branches of the ports repository List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 21 Sep 2021 20:28:30 -0000 The branch main has been updated by bhughes: URL: https://cgit.FreeBSD.org/ports/commit/?id=8c3ca5e4b36800a563559fc60bd6bcca0339b5cb commit 8c3ca5e4b36800a563559fc60bd6bcca0339b5cb Author: Bradley T. Hughes AuthorDate: 2021-09-21 19:34:38 +0000 Commit: Bradley T. Hughes CommitDate: 2021-09-21 20:26:35 +0000 security/vuxml: document Node.js July 2021 Security Releases https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/ Sponsored by: Miles AS --- security/vuxml/vuln-2021.xml | 40 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 40 insertions(+) diff --git a/security/vuxml/vuln-2021.xml b/security/vuxml/vuln-2021.xml index 78428bf81fae..660af90cfa8f 100644 --- a/security/vuxml/vuln-2021.xml +++ b/security/vuxml/vuln-2021.xml @@ -1,3 +1,43 @@ + + Node.js -- July 2021 Security Releases + + + node14 + 14.17.2 + + + node + 16.4.1 + + + + +

Node.js reports:

+
+

libuv upgrade - Out of bounds read (Medium) (CVE-2021-22918)

+

Node.js is vulnerable to out-of-bounds read in libuv's uv__idna_toascii() function which is used to convert strings to ASCII. This is called by Node's dns module's lookup() function and can lead to information disclosures or crashes.

+

Windows installer - Node Installer Local Privilege Escalation (Medium) (CVE-2021-22921)

+

Node.js is vulnerable to local privilege escalation attacks under certain conditions on Windows platforms. More specifically, improper configuration of permissions in the installation directory allows an attacker to perform two different escalation attacks: PATH and DLL hijacking.

+

npm upgrade - ssri Regular Expression Denial of Service (ReDoS) (High) (CVE-2021-27290)

+

This is a vulnerability in the ssri npm module which may be vulnerable to denial of service attacks.

+

npm upgrade - hosted-git-info Regular Expression Denial of Service (ReDoS) (Medium) (CVE-2021-23362)

+

This is a vulnerability in the hosted-git-info npm module which may be vulnerable to denial of service attacks.

+
+ +
+ + CVE-2021-22918 + CVE-2021-22921 + CVE-2021-27290 + CVE-2021-23362 + https://nodejs.org/en/blog/vulnerability/july-2021-security-releases/ + + + 2021-07-01 + 2021-09-21 + +
+ chromium -- multiple vulnerabilities