Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2134 | Deno is a runtime for JavaScript and TypeScript that uses V8 and is built in Rust. In Deno versions 1.5.0 to 1.10.1, modules that are dynamically imported through `import()` or `new Worker` might have been able to bypass network and file system permission checks when statically importing other modules. The vulnerability has been patched in Deno release 1.10.2. |
Github GHSA |
GHSA-xpwj-7v8q-mcgj | Deno's static imports inside dynamically imported modules do not adhere to permission checks |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T23:25:30.920Z
Reserved: 2021-05-12T00:00:00.000Z
Link: CVE-2021-32619
No data.
Status : Modified
Published: 2021-05-28T21:15:08.893
Modified: 2024-11-21T06:07:23.627
Link: CVE-2021-32619
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA