CVE-2021-23382

NameCVE-2021-23382
DescriptionThe package postcss before 8.2.13 are vulnerable to Regular Expression Denial of Service (ReDoS) via getAnnotationURL() and loadAnnotation() in lib/previous-map.js. The vulnerable regexes are caused mainly by the sub-pattern \/\*\s* sourceMappingURL=(.*).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-postcss (PTS)buster6.0.23-1vulnerable
bullseye8.2.1+~cs5.3.23-8fixed
bookworm8.4.20+~cs8.0.23-1fixed
sid, trixie8.4.49+~cs9.2.32-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-postcsssource(unstable)8.2.1+~cs5.3.23-7

Notes

[buster] - node-postcss <no-dsa> (Minor issue)
https://snyk.io/vuln/SNYK-JS-POSTCSS-1255640
https://github.com/postcss/postcss/commit/2ad1ca9b965dde32223bee28dc259c339cbaaa05 (8.2.13)

Search for package or bug name: Reporting problems