"Arbitrary filesystem write vulnerability in Yarn before 1.22.0 allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package." Affects <1.22.0. Fix: https://github.com/yarnpkg/yarn/pull/7831/commits/fc76f230e5d9a8bd37cbbdda1b38e9e19a1db950
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1167b651c1845379e649d8b0dac2fb4e7aa2fced commit 1167b651c1845379e649d8b0dac2fb4e7aa2fced Author: Zac Medico <zmedico@gentoo.org> AuthorDate: 2020-03-01 02:40:37 +0000 Commit: Zac Medico <zmedico@gentoo.org> CommitDate: 2020-03-01 02:41:02 +0000 sys-apps/yarn: remove vulnerable versions bug 711132 Bug: https://bugs.gentoo.org/711132 Package-Manager: Portage-2.3.89, Repoman-2.3.20 Signed-off-by: Zac Medico <zmedico@gentoo.org> sys-apps/yarn/Manifest | 2 -- sys-apps/yarn/yarn-1.19.2.ebuild | 39 --------------------------------------- sys-apps/yarn/yarn-1.21.1.ebuild | 40 ---------------------------------------- 3 files changed, 81 deletions(-)
Package has no stable ebuild. Repository is clean, all done.