{"id":"UBUNTU-CVE-2022-29244","details":"npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=\u003cname\u003e`). Anyone who has run `npm pack` or `npm publish` inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.","modified":"2026-01-20T17:27:01.474362Z","published":"2022-06-13T14:15:00Z","upstream":["CVE-2022-29244"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-29244"},{"type":"REPORT","url":"https://github.com/nodejs/node/pull/43210"},{"type":"REPORT","url":"https://github.com/nodejs/node/releases/tag/v18.3.0"},{"type":"REPORT","url":"https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52"},{"type":"REPORT","url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpack"},{"type":"REPORT","url":"https://github.com/nodejs/node/releases/tag/v17.9.1"},{"type":"REPORT","url":"https://github.com/npm/npm-packlist"},{"type":"REPORT","url":"https://github.com/npm/cli/tree/latest/workspaces/libnpmpublish"},{"type":"REPORT","url":"https://github.com/npm/cli/releases/tag/v8.11.0"},{"type":"REPORT","url":"https://github.com/nodejs/node/releases/tag/v16.15.1"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-29244"}],"affected":[{"package":{"name":"npm","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/npm@1.3.10~dfsg-1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.2.18~dfsg-3","1.3.10~dfsg-1"],"ecosystem_specific":{"binaries":[{"binary_version":"1.3.10~dfsg-1","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/npm@3.5.2-0ubuntu4.1.16.04.1~esm1?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["1.4.21+ds-2","3.5.2-0ubuntu4","3.5.2-0ubuntu4.1.16.04.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.2-0ubuntu4.1.16.04.1~esm1","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/npm@3.5.2-0ubuntu4.1.18.04.1~esm1?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.5.2-0ubuntu4","3.5.2-0ubuntu4.1.18.04.1~esm1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.5.2-0ubuntu4.1.18.04.1~esm1","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/npm@6.14.4+ds-1ubuntu2?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.8.0+ds6-4","6.14.4+ds-1ubuntu2"],"ecosystem_specific":{"binaries":[{"binary_version":"6.14.4+ds-1ubuntu2","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/npm@8.5.1~ds-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["7.5.2+ds-2","7.24.2+ds-1","7.24.2+ds-2","8.3.0~ds-1","8.3.0~ds-2","8.3.2~ds-1","8.5.0~ds-1","8.5.1~ds-1"],"ecosystem_specific":{"binaries":[{"binary_version":"8.5.1~ds-1","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/npm@9.2.0~ds1-2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.2.0~ds1-1","9.2.0~ds1-2"],"ecosystem_specific":{"binaries":[{"binary_version":"9.2.0~ds1-2","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}},{"package":{"name":"npm","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/npm@9.2.0~ds1-3?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["9.2.0~ds1-3"],"ecosystem_specific":{"binaries":[{"binary_version":"9.2.0~ds1-3","binary_name":"npm"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-29244.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}]}