From URL: "This release focuses on stabilization of recently released features including async/await and fixing bugs found by various fuzzers." Please update the njs bundled with nginx to 0.7.3.
*** Bug 838352 has been marked as a duplicate of this bug. ***
CVE-2022-27007 (https://github.com/nginx/njs/commit/ad48705bf1f04b4221a5f5b07715ac48b3160d53): nginx njs 0.7.2 is affected suffers from Use-after-free in njs_function_frame_alloc() when it try to invoke from a restored frame saved with njs_function_frame_save(). CVE-2022-27008 (https://github.com/nginx/njs/issues/471): nginx njs 0.7.2 is vulnerable to Buffer Overflow. Type confused in Array.prototype.concat() when a slow array appended element is fast array.
CVE-2022-28049 (https://github.com/nginx/njs/commit/f65981b0b8fcf02d69a40bc934803c25c9f607ab): https://github.com/nginx/njs/issues/473 NGINX NJS 0.7.2 was discovered to contain a NULL pointer dereference via the component njs_vmcode_array at /src/njs_vmcode.c.
CVE-2022-29369 (https://github.com/nginx/njs/commit/222d6fdcf0c6485ec8e175f3a7b70d650c234b4e): https://github.com/nginx/njs/issues/467 Nginx NJS v0.7.2 was discovered to contain a segmentation violation via njs_lvlhsh_bucket_find at njs_lvlhsh.c.
CVE-2022-30503 (https://github.com/nginx/njs/commit/5c6130a2a0b4c41ab415f6b8992aa323636338b9): https://github.com/nginx/njs/issues/478 Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_set_number at src/njs_value.h. CVE-2022-29779 (https://github.com/nginx/njs/issues/485): https://github.com/nginx/njs/commit/2e00e95473861846aa8538be87db07699d9f676d Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_value_own_enumerate at src/njs_value.c. CVE-2022-29780 (https://github.com/nginx/njs/issues/486): https://github.com/nginx/njs/commit/8b39afdad9a0761e0a5d4af1a762bd9a6daef572 Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_prototype_sort at src/njs_array.c. Fixes in 0.7.4.
CVE-2022-31306 (https://github.com/nginx/njs/issues/481): Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_array_convert_to_slow_array at src/njs_array.c. CVE-2022-31307 (https://github.com/nginx/njs/commit/eafe4c7a326b163612f10861392622b5da5b1792): Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c. CVE-2022-32414 (https://github.com/nginx/njs/issues/483): Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_vmcode_interpreter at src/njs_vmcode.c.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=fef9c212cc857654acea385e37a492e818e3d417 commit fef9c212cc857654acea385e37a492e818e3d417 Author: Tomáš Mózes <hydrapolic@gmail.com> AuthorDate: 2022-07-11 13:37:11 +0000 Commit: Conrad Kostecki <conikost@gentoo.org> CommitDate: 2022-07-13 19:01:59 +0000 www-servers/nginx: bump to 1.23.0 Bug: https://bugs.gentoo.org/838247 Closes: https://bugs.gentoo.org/852953 Signed-off-by: Tomáš Mózes <hydrapolic@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/26347 Signed-off-by: Conrad Kostecki <conikost@gentoo.org> www-servers/nginx/Manifest | 6 + .../files/http_headers_more-nginx-1.23.0.patch | 187 ++++ .../nginx/files/http_sticky-nginx-1.23.0.patch | 25 + .../files/http_uploadprogress-nginx-1.23.0.patch | 74 ++ www-servers/nginx/nginx-1.23.0.ebuild | 1028 ++++++++++++++++++++ 5 files changed, 1320 insertions(+)
Thanks hydrapolic! Please stable when ready.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=801dee7a6b58e92868a393bbf5a7c2720cdedf12 commit 801dee7a6b58e92868a393bbf5a7c2720cdedf12 Author: Tomáš Mózes <hydrapolic@gmail.com> AuthorDate: 2022-07-14 09:07:21 +0000 Commit: Conrad Kostecki <conikost@gentoo.org> CommitDate: 2022-07-14 19:01:20 +0000 www-servers/nginx: update vulnerable njs Bug: https://bugs.gentoo.org/838247 Signed-off-by: Tomáš Mózes <hydrapolic@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/26398 Signed-off-by: Conrad Kostecki <conikost@gentoo.org> www-servers/nginx/nginx-1.21.6-r3.ebuild | 1078 ++++++++++++++++++++++++++++++ 1 file changed, 1078 insertions(+)
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=effe6d2a83edc3cdd5a5d772145fe5f2d8f5d67c commit effe6d2a83edc3cdd5a5d772145fe5f2d8f5d67c Author: Tomáš Mózes <hydrapolic@gmail.com> AuthorDate: 2022-07-20 04:32:29 +0000 Commit: Conrad Kostecki <conikost@gentoo.org> CommitDate: 2022-07-20 07:38:48 +0000 www-servers/nginx: drop vulnerable Bug: https://bugs.gentoo.org/838247 Signed-off-by: Tomáš Mózes <hydrapolic@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/26491 Signed-off-by: Conrad Kostecki <conikost@gentoo.org> www-servers/nginx/Manifest | 1 - www-servers/nginx/nginx-1.21.6-r2.ebuild | 1078 ------------------------------ 2 files changed, 1079 deletions(-)
Thanks! These don't seem exploitable, so no GLSA. All done!