Debian 10261 Published by

A node-thenify security update has been released for Debian GNU/Linux 10 to address an issue that can result in arbitrary code execution.



DLA 3128-1: node-thenify security update



- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3128-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/ Utkarsh Gupta
October 01, 2022   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : node-thenify
Version : 3.3.0-1+deb10u1
CVE ID : CVE-2020-7677

thenify is a Promisify a callback-based function using any-promise.
Affected versions of this package are vulnerable to Arbitrary Code
Execution. The name argument provided to the package can be controlled
by users without any sanitization, and this is provided to the eval
function without any sanitization.

For Debian 10 buster, this problem has been fixed in version
3.3.0-1+deb10u1.

We recommend that you upgrade your node-thenify packages.

For the detailed security status of node-thenify please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/node-thenify

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS