Debian LTS: DLA-3228-1: node-json-schema security update | LinuxSec...

- -----------------------------------------------------------------------
Debian LTS Advisory DLA-3228-1              [email protected]
https://www.debian.org/lts/security/                      Utkarsh Gupta
December 07, 2022                           https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : node-json-schema
Version        : 0.2.3-1+deb10u1
CVE ID         : CVE-2021-3918
Debian Bug     : 999765

node-json-schema, JSON Schema validation and specifications, was
vulnerable to Improperly Controlled Modification of Object Prototype
Attributes.

For Debian 10 buster, this problem has been fixed in version
0.2.3-1+deb10u1.

We recommend that you upgrade your node-json-schema packages.

For the detailed security status of node-json-schema please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-json-schema

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3228-1: node-json-schema security update

December 7, 2022
node-json-schema, JSON Schema validation and specifications, was vulnerable to Improperly Controlled Modification of Object Prototype Attributes

Summary

For Debian 10 buster, this problem has been fixed in version
0.2.3-1+deb10u1.

We recommend that you upgrade your node-json-schema packages.

For the detailed security status of node-json-schema please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-json-schema

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Severity
Package : node-json-schema
Version : 0.2.3-1+deb10u1
CVE ID : CVE-2021-3918
Debian Bug : 999765

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.