Am Wed, May 29, 2024 at 10:26:24AM +0400 schrieb Yadd:
> On 5/29/24 00:40, Moritz Mühlenhoff wrote:
> > Source: node-ip
> > X-Debbugs-CC: t...@security.debian.org
> > Severity: important
> > Tags: security
> > 
> > Hi,
> > 
> > The following vulnerability was published for node-ip.
> > 
> > CVE-2024-29415[0]:
> > | The ip package through 2.0.1 for Node.js might allow SSRF because
> > | some IP addresses (such as 127.1, 01200034567, 012.1.2.3,
> > | 000:0:0000::01, and ::fFFf:127.0.0.1) are improperly categorized as
> > | globally routable via isPublic. NOTE: this issue exists because of
> > | an incomplete fix for CVE-2023-42282.
> > 
> > https://github.com/indutny/node-ip/issues/150
> > https://github.com/indutny/node-ip/pull/144
> > https://github.com/indutny/node-ip/pull/143
> > 
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] https://security-tracker.debian.org/tracker/CVE-2024-29415
> >      https://www.cve.org/CVERecord?id=CVE-2024-29415
> > 
> > Please adjust the affected versions in the BTS as needed.
> 
> The proposed patch changes node-ip behavior and needs recent nodejs. I just
> pushed it to experimental to have more test.

Given it was in experimental for almost a year, do you believe it's
ready to land in sid, so that it can make it to trixie?

Cheers,
        Moritz

Reply via email to