{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20201988", "Version": "oval:org.altlinux.errata:def:20201988", "Class": "patch", "Metadata": { "Title": "ALT-PU-2020-1988: package `yarn` update to version 1.22.4-alt0.1.p9", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch c9f2" ], "Products": [ "ALT SPWorkstation", "ALT SPServer" ] } ], "References": [ { "RefID": "ALT-PU-2020-1988", "RefURL": "https://errata.altlinux.org/ALT-PU-2020-1988", "Source": "ALTPU" }, { "RefID": "CVE-2019-10773", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-10773", "Source": "CVE" }, { "RefID": "CVE-2019-15608", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-15608", "Source": "CVE" }, { "RefID": "CVE-2020-8131", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-8131", "Source": "CVE" } ], "Description": "This update upgrades yarn to version 1.22.4-alt0.1.p9. \nSecurity Fix(es):\n\n * CVE-2019-10773: In Yarn before 1.21.1, the package install functionality can be abused to generate arbitrary symlinks on the host filesystem by using specially crafted \"bin\" keys. Existing files could be overwritten depending on the current user permission set.\n\n * CVE-2019-15608: The package integrity validation in yarn \u003c 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack.\n\n * CVE-2020-8131: Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.", "Advisory": { "From": "errata.altlinux.org", "Severity": "High", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2020-05-21" }, "Updated": { "Date": "2020-05-21" }, "BDUs": null, "CVEs": [ { "ID": "CVE-2019-10773", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-59", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-10773", "Impact": "High", "Public": "20191216" }, { "ID": "CVE-2019-15608", "CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "CWE": "CWE-367", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-15608", "Impact": "Low", "Public": "20200315" }, { "ID": "CVE-2020-8131", "CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-22", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-8131", "Impact": "High", "Public": "20200224" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:spworkstation:8.4", "cpe:/o:alt:spserver:8.4" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:3001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20201988001", "Comment": "yarn is earlier than 0:1.22.4-alt0.1.p9" } ] } ] } } ] }