Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Jun 2018 05:09:51 +0000 (UTC)
From:      "Bradley T. Hughes" <bhughes@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r472426 - head/security/vuxml
Message-ID:  <201806150509.w5F59pRM059372@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bhughes
Date: Fri Jun 15 05:09:51 2018
New Revision: 472426
URL: https://svnweb.freebsd.org/changeset/ports/472426

Log:
  security/vuxml: document Node.js vulnerabilities
  
  https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Jun 15 04:50:30 2018	(r472425)
+++ head/security/vuxml/vuln.xml	Fri Jun 15 05:09:51 2018	(r472426)
@@ -58,6 +58,81 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="45b8e2eb-7056-11e8-8fab-63ca6e0e13a2">
+    <topic>node.js -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>node6</name>
+	<range><lt>6.14.3</lt></range>
+      </package>
+      <package>
+	<name>node8</name>
+	<range><lt>8.11.3</lt></range>
+      </package>
+      <package>
+	<name>node</name>
+	<range><lt>10.4.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Node.js reports:</p>
+	<blockquote cite="https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/">;
+          <h1>Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)</h1>
+	  <p>All versions of 8.x and later are vulnerable and the severity is
+            HIGH. An attacker can cause a denial of service (DoS) by causing a
+            node server providing an http2 server to crash. This can be
+            accomplished by interacting with the http2 server in a manner that
+            triggers a cleanup bug where objects are used in native code after
+            they are no longer available. This has been addressed by updating
+            the http2 implementation. Thanks to Jordan Zebor at F5 Networks for
+            reporting this issue.</p>
+          <h1>Denial of Service, nghttp2 dependency (CVE-2018-1000168)</h1>
+	  <p>All versions of 9.x and later are vulnerable and the severity is
+            HIGH. Under certain conditions, a malicious client can trigger an
+            uninitialized read (and a subsequent segfault) by sending a
+            malformed ALTSVC frame. This has been addressed through an by
+            updating nghttp2.</p>
+          <h1>Denial of Service Vulnerability in TLS (CVE-2018-7162)</h1>
+	  <p>All versions of 9.x and later are vulnerable and the severity is
+            HIGH. An attacker can cause a denial of service (DoS) by causing a
+            node process which provides an http server supporting TLS server to
+            crash. This can be accomplished by sending duplicate/unexpected
+            messages during the handshake. This vulnerability has been addressed
+            by updating the TLS implementation. Thanks to Jordan Zebor at F5
+            Networks all of his help investigating this issue with the Node.js
+            team.</p>
+          <h1>Memory exhaustion DoS on v9.x (CVE-2018-7164)</h1>
+	  <p>Versions 9.7.0 and later are vulnerable and the severity is MEDIUM.
+            A bug introduced in 9.7.0 increases the memory consumed when reading
+            from the network into JavaScript using the net.Socket object
+            directly as a stream. An attacker could use this cause a denial of
+            service by sending tiny chunks of data in short succession. This
+            vulnerability was restored by reverting to the prior behaviour.</p>
+          <h1>Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)</h1>
+	  <p>Calling Buffer.fill() or Buffer.alloc() with some parameters can
+            lead to a hang which could result in a Denial of Service. In order
+            to address this vulnerability, the implementations of Buffer.alloc()
+            and Buffer.fill() were updated so that they zero fill instead of
+            hanging in these cases.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/</url>;
+      <url>https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/</url>;
+      <cvename>CVE-2018-7161</cvename>
+      <cvename>CVE-2018-7162</cvename>
+      <cvename>CVE-2018-7164</cvename>
+      <cvename>CVE-2018-7167</cvename>
+      <cvename>CVE-2018-1000168</cvename>
+    </references>
+    <dates>
+      <discovery>2018-06-12</discovery>
+      <entry>2018-06-15</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="53eb9e1e-7014-11e8-8b1f-3065ec8fd3ec">
     <topic>password-store -- GPG parsing vulnerabilities</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201806150509.w5F59pRM059372>