DEBIAN-CVE-2020-28500

Source
https://security-tracker.debian.org/tracker/CVE-2020-28500
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2020-28500.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2020-28500
Upstream
Published
2021-02-15T11:15:12Z
Modified
2025-09-25T02:18:39.511114Z
Summary
[none]
Details

Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.

References

Affected packages

Debian:11 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / node-lodash

Package

Name
node-lodash
Purl
pkg:deb/debian/node-lodash?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.17.21+dfsg+~cs8.31.173-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}