Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 836659 (CVE-2022-27306) - net-libs/nodejs: hostname spoofing
Summary: net-libs/nodejs: hostname spoofing
Alias: CVE-2022-27306
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B4 [??]
Depends on:
Reported: 2022-04-02 17:10 UTC by John Helmert III
Modified: 2022-07-08 19:45 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-04-02 17:10:53 UTC

The function url.parse() in Node.js v17.7.0 allows attackers to spoof a hostname.

Not many details about this, but there is a fix commit at URL.
Comment 1 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-07-08 19:45:19 UTC says

"There’s no intention of backporting this to LTS releases, it’s a breaking change that has been reverted, and that we are not interested in landing anymore. Snyk report is wrong when it says Node.js 17.7.1 is not affected (it is, we have reverted the fix on that version), and is wrong when it calls it a vulnerability.

FYI that Snyk report is only about the legacy URL parser, if you are using the WHATWG one, you can safely ignore that quirk." says

"I would also note that this is not a vulnerability. We have analyzed this in great detail and it's not a problem."

The CVE description is now:

"** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."