Summary: | <net-libs/nodejs-{0.12.10,4.4.0}: two vulnerabilities (CVE-2016-{2086,2216}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | bugs, pacho, patrick, proxy-maint |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
![]() Update from maintainer (by proxy): One of these vulnerabilities actually lives in net-libs/http-parser which was bumped to 2.6.1 Yesterday. net-libs/nodejs-5.6.0 is work in progress; an ebuild sent for review (to proxies) available here: https://github.com/gentoo/gentoo/pull/781 "Unfortunately" we also have to bump 0.10, 0.12, and the LTS 4.x series. I will be reviewing these ebuilds the coming days. http-parser might not be releasing stable series for each of these so I will have to review that it works as intended before we bump. If anyone wants more information about these vulnerabilities, feel free to contact me privately. ebuild for both http-parser-2.6.1 and nodejs-5.6.0 are in tree. Does 4.4.1 fix this? (it should be stabilized in bug 568900 it seems) @ Arches, please test and mark stable: =net-libs/nodejs-0.12.10 amd64 stable x86 stable. Maintainer(s), please cleanup. Security, please vote. CVE-2016-2216 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2216): The HTTP header parsing code in Node.js 0.10.x before 0.10.42, 0.11.6 through 0.11.16, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allows remote attackers to bypass an HTTP response-splitting protection mechanism via UTF-8 encoded Unicode characters in the HTTP header, as demonstrated by %c4%8d%c4%8a. CVE-2016-2086 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2086): Node.js 0.10.x before 0.10.42, 0.12.x before 0.12.10, 4.x before 4.3.0, and 5.x before 5.6.0 allow remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. Proxy-maint package... tree is clean: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=4d0628374cf5c335f3246a4cdef9d17a6c543787 GLSA Vote: No |