Debian LTS: DLA-3295-1: node-moment security update
Summary
CVE-2022-24785
A path traversal vulnerability impacts npm (server) users of
Moment.js, especially if a user-provided locale string is directly
used to switch moment locale.
CVE-2022-31129
Affected versions of moment were found to use an inefficient
parsing algorithm. Specifically using string-to-date parsing in
moment (more specifically rfc2822 parsing, which is tried by
default) has quadratic (N^2) complexity on specific inputs. Users may notice a noticeable slowdown is observed with inputs above 10k
characters. Users who pass user-provided strings without sanity
length checks to moment constructor are vulnerable to (Re)DoS
attacks.
For Debian 10 buster, these problems have been fixed in version
2.24.0+ds-1+deb10u1.
We recommend that you upgrade your node-moment packages.
For the detailed security status of node-moment please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/source-package/node-moment
Further information abo...