Your message dated Wed, 29 May 2024 08:35:22 +0000
with message-id <e1scemi-00ff4e...@fasolo.debian.org>
and subject line Bug#1071631: fixed in node-micromatch 4.0.7+~4.0.7-1
has caused the Debian Bug report #1071631,
regarding node-micromatch: CVE-2024-4067
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1071631: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071631
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: node-micromatch
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerability was published for node-micromatch.

CVE-2024-4067[0]:
| The NPM package `micromatch` is vulnerable to Regular Expression
| Denial of Service (ReDoS). The vulnerability occurs in
| `micromatch.braces()` in `index.js` because the pattern `.*` will
| greedily match anything. By passing a malicious payload, the pattern
| matching will keep backtracking to the input while it doesn't find
| the closing bracket. As the input size increases, the consumption
| time will also increase until it causes the application to hang or
| slow down. There was a merged fix but further testing shows the
| issue persists. This issue should be mitigated by using a safe
| pattern that won't start backtracking the regular expression due to
| greedy matching.

https://github.com/micromatch/micromatch/issues/243
https://github.com/micromatch/micromatch/pull/247


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-4067
    https://www.cve.org/CVERecord?id=CVE-2024-4067

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
Source: node-micromatch
Source-Version: 4.0.7+~4.0.7-1
Done: Yadd <y...@debian.org>

We believe that the bug you reported is fixed in the latest version of
node-micromatch, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1071...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd <y...@debian.org> (supplier of updated node-micromatch package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 29 May 2024 11:46:27 +0400
Source: node-micromatch
Architecture: source
Version: 4.0.7+~4.0.7-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 
<pkg-javascript-de...@lists.alioth.debian.org>
Changed-By: Yadd <y...@debian.org>
Closes: 1071631
Changes:
 node-micromatch (4.0.7+~4.0.7-1) unstable; urgency=medium
 .
   * Team upload
   * Update lintian override info format in d/source/lintian-overrides
     on line 2-5
   * Set upstream metadata fields: Bug-Database, Bug-Submit, Repository-Browse
   * Declare compliance with policy 4.7.0
   * New upstream version 4.0.7+~4.0.7
   * Fix ReDoS (Closes: #1071631, CVE-2024-4067)
Checksums-Sha1: 
 1c058f9c483e9b54b76c3d2b15d119e53147c729 2532 
node-micromatch_4.0.7+~4.0.7-1.dsc
 6a0bdf162a025e02318886107f27a55dbcd2fff2 5922 
node-micromatch_4.0.7+~4.0.7.orig-types-micromatch.tar.gz
 dbf8f8d3d8d19734b0bc183e8f8a9684f7dae8bb 88680 
node-micromatch_4.0.7+~4.0.7.orig.tar.gz
 ac48b0344b66700b0c5af036caefc5991c2bd483 4636 
node-micromatch_4.0.7+~4.0.7-1.debian.tar.xz
Checksums-Sha256: 
 3eaac9bb0d0974fec6f6cb7669d4145ee4fc85c88adfb02a7774bd4091414cb2 2532 
node-micromatch_4.0.7+~4.0.7-1.dsc
 295a742699657adf52077a1c82aad7748e9e535ab18f2b93cce25b4afa4a2d8f 5922 
node-micromatch_4.0.7+~4.0.7.orig-types-micromatch.tar.gz
 e504ec4651237cf01b411fe5758871ee782f1a1e1d5bfe11f343aa35c482bfc5 88680 
node-micromatch_4.0.7+~4.0.7.orig.tar.gz
 5b7b512429b170cade14f1a3bd341c1fac4f87bff05f2f8f60de73a6ab1d0eff 4636 
node-micromatch_4.0.7+~4.0.7-1.debian.tar.xz
Files: 
 dc6379557e343ec74404542aa411bc8b 2532 javascript optional 
node-micromatch_4.0.7+~4.0.7-1.dsc
 05ec0dfc43aeaef13e6d485e9649a5cf 5922 javascript optional 
node-micromatch_4.0.7+~4.0.7.orig-types-micromatch.tar.gz
 e42d39eee8e676df1cb099cf8e78a5f4 88680 javascript optional 
node-micromatch_4.0.7+~4.0.7.orig.tar.gz
 b260057d6af41d9f9dadd3105ed99dba 4636 javascript optional 
node-micromatch_4.0.7+~4.0.7-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEAN/li4tVV3nRAF7J9tdMp8mZ7ukFAmZW3e8ACgkQ9tdMp8mZ
7ulHTw//YMrekK+jGzdubSkBEBKnIYBR6q2pZkFXTwsH2CN9lhhCOCC9b4sT7CDv
ZW6BANEs7A0ACiRL8Ju6fCUdiCRJImPFdQE8sAJk+8s2bqXdGVzlo+VInodFYTZh
9Z0YxCM8/Vs3LlINxcZdZqbv8bLkttDn6Im9H1hgplhUrKoIiwzz30Z7t4o5Kvbw
XK13GdiAnf1bKa/LHE1C4TK1ts4w1T1hzE1Z8mr6jEfaotQv6lN6F3PA5jx2coCK
Nm6B1ueFowj7Ye6oarbaJ1vRVeHI7eGZTC5GPgIX3HdBDF8T3xUWB061OQ1Fo1Ht
fsEyJxhh01w6WG8dQNN5H0Yy75Jz17IZjxLyjCL7IyPDu2IoNZ9JYK/+ujzHYvD8
xEfbmAH6X4wdRk8ibLCTB3V9LdAQdNDety44InHxhSQM4XESvtHWSI6PF9PBQhlQ
tEk+mTUuEWfEnP5T7vS09QSMGGkh0dW2a+6C+kN0cYv8ETYG4iZ+T6+FzcBHsta4
gFzt3F6SN2Ac/UBCdvKhK/0Gi5aeNA4KC9xQL5VrpokJD7gd02ebIiIOpkh67hea
IanZMQ+N5/hYmNesnMIPl98noF+E/ZXXfj/K4a5qkhlmhMbJDDzI+NG6RThXQbJd
FzC5VOWyYlZkIPYAd+HEFUcKw0RQVFZvrhBYWkl7BPytuoiaocY=
=qpzO
-----END PGP SIGNATURE-----

Attachment: pgpvvE9Gg3paM.pgp
Description: PGP signature


--- End Message ---
-- 
Pkg-javascript-devel mailing list
Pkg-javascript-devel@alioth-lists.debian.net
https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to