[Debian] High CVE: CVE-2022-25844/CVE-2023-26116/.../CVE-2025-0716/CVE-2025-2336 angular.js : multiple CVEs

Bug #2119175 reported by Yue Tao
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
StarlingX
Fix Released
High
Peng Zhang

Bug Description

CVE-2022-25844: https://nvd.nist.gov/vuln/detail/CVE-2022-25844

The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. *Note:* 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher.

CVE-2023-26116: https://nvd.nist.gov/vuln/detail/CVE-2023-26116

Versions of the package angular from 1.2.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the angular.copy() utility function due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVE-2023-26117: https://nvd.nist.gov/vuln/detail/CVE-2023-26117

Versions of the package angular from 1.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) via the $resource service due to the usage of an insecure regular expression. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVE-2023-26118: https://nvd.nist.gov/vuln/detail/CVE-2023-26118

Versions of the package angular from 1.4.9 are vulnerable to Regular Expression Denial of Service (ReDoS) via the <input type="url"> element due to the usage of an insecure regular expression in the input[url] functionality. Exploiting this vulnerability is possible by a large carefully-crafted input, which can result in catastrophic backtracking.

CVE-2024-8372: https://nvd.nist.gov/vuln/detail/CVE-2024-8372

Improper sanitization of the value of the 'srcset' attribute in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects AngularJS versions 1.3.0-rc.4 and greater. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

CVE-2024-8373: https://nvd.nist.gov/vuln/detail/CVE-2024-8373

Improper sanitization of the value of the [srcset] attribute in <source> HTML elements in AngularJS allows attackers to bypass common image source restrictions, which can also lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing . This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

CVE-2024-21490: https://nvd.nist.gov/vuln/detail/CVE-2024-21490

This affects versions of the package angular from 1.3.0. A regular expression used to split the value of the ng-srcset directive is vulnerable to super-linear runtime due to backtracking. With large carefully-crafted input, this can result in catastrophic backtracking and cause a denial of service.

*Note:*

This package is EOL and will not receive any updates to address this issue. Users should migrate to [@angular/core](https://www.npmjs.com/package/@angular/core).

CVE-2025-0716: https://nvd.nist.gov/vuln/detail/CVE-2025-0716

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects all versions of AngularJS. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

CVE-2025-2336: https://nvd.nist.gov/vuln/detail/CVE-2025-2336

Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS's 'ngSanitize' module allows attackers to bypass common image source restrictions. This can lead to a form of Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images. This issue affects AngularJS versions greater than or equal to 1.3.1. Note: The AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see here https://docs.angularjs.org/misc/version-support-status .

Base Score: High

Reference:

['libjs-angularjs_1.8.2-2_all.deb===>libjs-angularjs_1.8.3-1+deb12u1~deb11u1_all.deb']
https://security-tracker.debian.org/tracker/DLA-4242-1
https://www.tenable.com/plugins/nessus/242412

Peng Zhang (pzhang2)
Changed in starlingx:
assignee: nobody → Peng Zhang (pzhang2)
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix proposed to tools (master)

Fix proposed to branch: master
Review: https://review.opendev.org/c/starlingx/tools/+/956452

Changed in starlingx:
status: Triaged → In Progress
Revision history for this message
OpenStack Infra (hudson-openstack) wrote : Fix merged to tools (master)

Reviewed: https://review.opendev.org/c/starlingx/tools/+/956452
Committed: https://opendev.org/starlingx/tools/commit/263b3342eed820a8b46653ce720fbc19ba5b9df5
Submitter: "Zuul (22348)"
Branch: master

commit 263b3342eed820a8b46653ce720fbc19ba5b9df5
Author: Peng Zhang <email address hidden>
Date: Fri Aug 1 05:52:56 2025 +0000

    Debian: libjs-angularjs: fix multiple CVEs

    Upgrade libjs-angularjs to 1.8.3-1+deb12u1~deb11u1

    CVE-2022-25844: https://nvd.nist.gov/vuln/detail/CVE-2022-25844
    CVE-2023-26116: https://nvd.nist.gov/vuln/detail/CVE-2023-26116
    CVE-2023-26117: https://nvd.nist.gov/vuln/detail/CVE-2023-26117
    CVE-2023-26118: https://nvd.nist.gov/vuln/detail/CVE-2023-26118
    CVE-2024-8372: https://nvd.nist.gov/vuln/detail/CVE-2024-8372
    CVE-2024-8373: https://nvd.nist.gov/vuln/detail/CVE-2024-8373
    CVE-2024-21490: https://nvd.nist.gov/vuln/detail/CVE-2024-21490
    CVE-2025-0716: https://nvd.nist.gov/vuln/detail/CVE-2025-0716
    CVE-2025-2336: https://nvd.nist.gov/vuln/detail/CVE-2025-2336
    https://security-tracker.debian.org/tracker/DLA-4242-1
    https://www.tenable.com/plugins/nessus/242412

    TestPlan:
    PASS: downloader; build-pkgs
    PASS: build-image
    PASS: install on DX-lab

    Closes-Bug: 2119175
    Change-Id: I897619c09d904ffc499a9df78df3ae9d258824d1

    Change-Id: Iebc62bb9b58208b27b828acdde1d14c1afaa530e
    Signed-off-by: Peng Zhang <email address hidden>

Changed in starlingx:
status: In Progress → Fix Released
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.