From owner-svn-ports-all@freebsd.org Mon Mar 9 21:54:55 2020 Return-Path: Delivered-To: svn-ports-all@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id ED8D426E697; Mon, 9 Mar 2020 21:54:55 +0000 (UTC) (envelope-from bhughes@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 48bsTC5Gchz4cvn; Mon, 9 Mar 2020 21:54:55 +0000 (UTC) (envelope-from bhughes@FreeBSD.org) Received: from repo.freebsd.org (repo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:0]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 9841419629; Mon, 9 Mar 2020 21:54:55 +0000 (UTC) (envelope-from bhughes@FreeBSD.org) Received: from repo.freebsd.org ([127.0.1.37]) by repo.freebsd.org (8.15.2/8.15.2) with ESMTP id 029Lst1N015937; Mon, 9 Mar 2020 21:54:55 GMT (envelope-from bhughes@FreeBSD.org) Received: (from bhughes@localhost) by repo.freebsd.org (8.15.2/8.15.2/Submit) id 029Lssnu015935; Mon, 9 Mar 2020 21:54:54 GMT (envelope-from bhughes@FreeBSD.org) Message-Id: <202003092154.029Lssnu015935@repo.freebsd.org> X-Authentication-Warning: repo.freebsd.org: bhughes set sender to bhughes@FreeBSD.org using -f From: "Bradley T. Hughes" Date: Mon, 9 Mar 2020 21:54:54 +0000 (UTC) To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r528135 - head/security/vuxml X-SVN-Group: ports-head X-SVN-Commit-Author: bhughes X-SVN-Commit-Paths: head/security/vuxml X-SVN-Commit-Revision: 528135 X-SVN-Commit-Repository: ports MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: svn-ports-all@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: SVN commit messages for the ports tree List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Mar 2020 21:54:56 -0000 Author: bhughes Date: Mon Mar 9 21:54:54 2020 New Revision: 528135 URL: https://svnweb.freebsd.org/changeset/ports/528135 Log: security/vuxml: document recent Node.js vulnerabilities https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/ While here, fix errors from `make validate` for the preceeding gitea vulnerabilities. Sponsored by: Miles AS Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Mon Mar 9 21:29:24 2020 (r528134) +++ head/security/vuxml/vuln.xml Mon Mar 9 21:54:54 2020 (r528135) @@ -58,6 +58,50 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + Node.js -- multiple vulnerabilities + + + node + 13.8.0 + + + node12 + 12.15.0 + + + node10 + 10.19.0 + + + + +

Node.js reports:

+
+

Updates are now available for all active Node.js release lines for the following issues.

+

HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)HTTP request smuggling using malformed Transfer-Encoding header (Critical) (CVE-2019-15605)

+

Affected Node.js versions can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system.

+

HTTP header values do not have trailing OWS trimmed (High) (CVE-2019-15606)

+

Optional whitespace should be trimmed from HTTP header values. Its presence may allow attackers to bypass security checks based on HTTP header values.

+

Remotely trigger an assertion on a TLS server with a malformed certificate string (High) (CVE-2019-15604)

+

Connecting to a NodeJS TLS server with a client certificate that has a type 19 string in its subjectAltName will crash the TLS server if it tries to read the peer certificate.

+

Strict HTTP header parsing (None)

+

Increase the strictness of HTTP header parsing. There are no known vulnerabilities addressed, but lax HTTP parsing has historically been a source of problems. Some commonly used sites are known to generate invalid HTTP headers, a --insecure-http-parser CLI option or insecureHTTPParser http option can be used if necessary for interoperability, but is not recommended.

+
+ +
+ + https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/ + CVE-2019-15605 + CVE-2019-15606 + CVE-2019-15604 + + + 2020-02-06 + 2020-03-09 + +
+ gitea -- multiple vulnerabilities @@ -71,25 +115,25 @@ Notes:

The Gitea Team reports for release 1.11.0:

    -
  • Never allow an empty password to validate (#9682) (#9683)
  • -
  • Prevent redirect to Host (#9678) (#9679)
  • -
  • Swagger hide search field (#9554)
  • -
  • Add "search" to reserved usernames (#9063)
  • -
  • Switch to fomantic-ui (#9374)
  • -
  • Only serve attachments when linked to issue/release and if accessible by user (#9340)
  • +
  • Never allow an empty password to validate (#9682) (#9683)
  • +
  • Prevent redirect to Host (#9678) (#9679)
  • +
  • Swagger hide search field (#9554)
  • +
  • Add "search" to reserved usernames (#9063)
  • +
  • Switch to fomantic-ui (#9374)
  • +
  • Only serve attachments when linked to issue/release and if accessible by user (#9340)

The Gitea Team reports for release 1.11.2:

    -
  • Ensure only own addresses are updated (#10397) (#10399)
  • -
  • Logout POST action (#10582) (#10585)
  • +
  • Ensure only own addresses are updated (#10397) (#10399)
  • +
  • Logout POST action (#10582) (#10585)
  • Org action fixes and form cleanup (#10512) (#10514)
  • -
  • Change action GETs to POST (#10462) (#10464)
  • -
  • Fix admin notices (#10480) (#10483)
  • -
  • Change admin dashboard to POST (#10465) (#10466)
  • -
  • Update markbates/goth (#10444) (#10445)
  • -
  • Update crypto vendors (#10385) (#10398)
  • +
  • Change action GETs to POST (#10462) (#10464)
  • +
  • Fix admin notices (#10480) (#10483)
  • +
  • Change admin dashboard to POST (#10465) (#10466)
  • +
  • Update markbates/goth (#10444) (#10445)
  • +
  • Update crypto vendors (#10385) (#10398)