Summary: | <net-libs/nodejs-{0.8.26,0.10.21}: HTTP Pipelining DoS (CVE-2013-4450) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Mikle Kolyada (RETIRED) <zlogene> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | bugs, patrick, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://seclists.org/oss-sec/2013/q4/133 | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Mikle Kolyada (RETIRED)
2013-10-19 17:42:40 UTC
+ 21 Oct 2013; Patrick Lauer <patrick@gentoo.org> +nodejs-0.10.21.ebuild, + +nodejs-0.8.26.ebuild, -nodejs-0.10.17.ebuild, -nodejs-0.10.18.ebuild, + -nodejs-0.10.19.ebuild, -nodejs-0.10.20.ebuild, -nodejs-0.8.21.ebuild, + -nodejs-0.8.23.ebuild: + Bump for #488624 All affected versions punted. Arches, please test and mark stable: =net-libs/nodejs-0.10.21 target KEYWORDS="amd64 x86" amd64 and x86 stable, please vote. CVE-2013-4450 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4450): The HTTP server in Node.js 0.10.x before 0.10.21 and 0.8.x before 0.8.26 allows remote attackers to cause a denial of service (memory and CPU consumption) by sending a large number of pipelined requests without reading the response. GLSA vote: no. GLSA vote: no Closing noglsa |