CVE-2020-28500

NameCVE-2020-28500
DescriptionLodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs985086

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-lodash (PTS)jessie2.4.1+dfsg-3vulnerable
stretch4.16.6+dfsg-2vulnerable
buster4.17.11+dfsg-2+deb10u1vulnerable
bullseye4.17.21+dfsg+~cs8.31.173-1fixed
sid, trixie, bookworm4.17.21+dfsg+~cs8.31.198.20210220-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-lodashsourcejessie(unfixed)end-of-life
node-lodashsourcestretch(unfixed)end-of-life
node-lodashsource(unstable)4.17.21+dfsg+~cs8.31.173-1985086

Notes

[buster] - node-lodash <no-dsa> (Minor issue)
[stretch] - node-lodash <end-of-life> (Nodejs in stretch not covered by security support)
https://snyk.io/vuln/SNYK-JS-LODASH-1018905

Search for package or bug name: Reporting problems