Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 625562 (CVE-2017-11499) - <net-libs/nodejs-{4.8.5,6.11.1}: multiple vulnerabilities
Summary: <net-libs/nodejs-{4.8.5,6.11.1}: multiple vulnerabilities
Status: RESOLVED FIXED
Alias: CVE-2017-11499
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://nodejs.org/en/blog/vulnerabil...
Whiteboard: B3 [noglsa cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-07-18 19:02 UTC by Thomas Deutschmann (RETIRED)
Modified: 2019-10-31 12:16 UTC (History)
3 users (show)

See Also:
Package list:
=net-libs/nodejs-4.8.5 amd64 x86 =net-libs/nodejs-6.11.5 amd64 arm ppc ppc64 x86
Runtime testing required: ---
stable-bot: sanity-check+


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2017-07-18 19:02:49 UTC
Constant Hashtable Seeds (CVE pending)

Node.js was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup. Thanks to Jann Horn of Google Project Zero for reporting this vulnerability.

You can read about the general category of hash flooding vulnerabilities here: https://events.ccc.de/congress/2011/Fahrplan/attachments/2007_28C3_Effective_DoS_on_web_application_platforms.pdf.

Snapshots have been disabled by default in these updates. Code that relies heavily on vm.runInNewContext will most likely see a performance regression until a better solution is implemented.

This is a high severity vulnerability and applies to all active release lines (4.x, 6.x, 8.x) as well as the 7.x line.

Note: The 0.10.x and 0.12.x release lines are also vulnerable to the Constant Hashtable Seeds vulnerability. We recommend that users of these release lines upgrade to one of the supported LTS release lines.



http.get with numeric authorization options creates uninitialized buffers

Application code that allows the auth field of the options object used with http.get() to be set to a number can result in an uninitialized buffer being created/used as the authentication string. For example:

const opts = require('url').parse('http://127.0.0.1:8180');
opts.auth = 1e3; // A number here triggers the bug
require('http').get(opts, res => res.pipe(process.stdout));

Parsing of the auth field has been updated in the 4.x release so that a TypeError will be thrown if the auth field is a number when http.get() is called.

This is a low severity defect and only applies to the 4.x release line.
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-07-18 19:05:18 UTC
@ Maintainer(s): Please bump

 - 4.x to >=4.8.4
 - 6.x to >=6.11.1
 - 7.x to >=7.10.1

v8.x (8.1.4) is already patched

And please tell us how you want to proceed with v0.12.x which is affected. Can we drop this version?
Comment 2 Christopher Díaz Riveros (RETIRED) gentoo-dev Security 2017-07-25 21:31:22 UTC
CVE assigned:

CVE-2017-11499

References:

https://nvd.nist.gov/vuln/detail/CVE-2017-11499

ChrisADR
Gentoo Security Padawan
Comment 3 Thomas Deutschmann (RETIRED) gentoo-dev 2017-10-30 15:49:42 UTC
@ Arches,

please test and mark stable:

  =net-libs/nodejs-4.8.5 amd64 x86
  =net-libs/nodejs-6.11.5 amd64 arm ppc ppc64 x86
Comment 4 Thomas Deutschmann (RETIRED) gentoo-dev 2017-10-30 15:54:37 UTC
net-libs/nodejs-0.x cleanup CI test: https://github.com/gentoo/gentoo/pull/6088
Comment 5 Thomas Deutschmann (RETIRED) gentoo-dev 2017-11-02 21:18:21 UTC
x86 stable
Comment 6 Manuel Rüger (RETIRED) gentoo-dev 2017-11-07 12:52:58 UTC
Stable on amd64
Comment 7 Sergei Trofimovich (RETIRED) gentoo-dev 2017-11-12 18:34:50 UTC
ppc64 stable
Comment 8 Sergei Trofimovich (RETIRED) gentoo-dev 2017-11-14 09:10:38 UTC
ppc stable
Comment 9 Mikle Kolyada (RETIRED) archtester Gentoo Infrastructure gentoo-dev Security 2018-03-15 14:42:08 UTC
arm stable
Comment 10 Thomas Deutschmann (RETIRED) gentoo-dev 2019-10-31 12:16:49 UTC
GLSA Vote: No!

Repository is clean, all done!