Descriptiones5-ext contains ECMAScript 5 extensions. Passing functions with very long names or complex default argument names into `function#copy` or `function#toStringTokens` may cause the script to stall. The vulnerability is patched in v0.10.63.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1064933

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-es5-ext (PTS)buster0.10.30-1vulnerable
sid, trixie, bookworm0.10.62+dfsg1+~1.1.0-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs


[bookworm] - node-es5-ext <no-dsa> (Minor issue)
[bullseye] - node-es5-ext <no-dsa> (Minor issue)
[buster] - node-es5-ext <no-dsa> (Minor issue) (v1.10.63) (v1.10.63)

Search for package or bug name: Reporting problems