Fedora 33: nodejs-underscore 2021-e49f936d9f | LinuxSecurity.com

Advisories

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2021-e49f936d9f
2021-08-24 01:04:49.849861
--------------------------------------------------------------------------------

Name        : nodejs-underscore
Product     : Fedora 33
Version     : 1.13.1
Release     : 1.fc33
URL         : https://underscorejs.org/
Summary     : JavaScript's functional programming helper library
Description :
Underscore.js is a utility-belt library for JavaScript that provides support
for the usual functional suspects (each, map, reduce, filter...) without
extending any core JavaScript objects.

--------------------------------------------------------------------------------
Update Information:

upstream release 1.13.1, including fix for CVE-2021-23358
--------------------------------------------------------------------------------
ChangeLog:

* Sun Aug 15 2021 Dan Callaghan  - 1.13.1-1
- upstream release 1.13.1, including fix for CVE-2021-23358
* Sat Aug  1 2020 Fedora Release Engineering  - 1.10.2-3
- Second attempt - Rebuilt for
  https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
* Tue Jul 28 2020 Fedora Release Engineering  - 1.10.2-2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1944287 - CVE-2021-23358 nodejs-underscore: Arbitrary code execution via the template function [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1944287
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-e49f936d9f' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure

Fedora 33: nodejs-underscore 2021-e49f936d9f

August 23, 2021

Summary

Underscore.js is a utility-belt library for JavaScript that provides support

for the usual functional suspects (each, map, reduce, filter...) without

extending any core JavaScript objects.

Update Information:

upstream release 1.13.1, including fix for CVE-2021-23358

Change Log

* Sun Aug 15 2021 Dan Callaghan - 1.13.1-1 - upstream release 1.13.1, including fix for CVE-2021-23358 * Sat Aug 1 2020 Fedora Release Engineering - 1.10.2-3 - Second attempt - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild * Tue Jul 28 2020 Fedora Release Engineering - 1.10.2-2 - Rebuilt for https://fedoraproject.org/wiki/Fedora_33_Mass_Rebuild

References

[ 1 ] Bug #1944287 - CVE-2021-23358 nodejs-underscore: Arbitrary code execution via the template function [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=1944287

Update Instructions

This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2021-e49f936d9f' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

Severity
Name : nodejs-underscore
Product : Fedora 33
Version : 1.13.1
Release : 1.fc33
URL : https://underscorejs.org/
Summary : JavaScript's functional programming helper library

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.