aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml75
1 files changed, 75 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 7809b449c3a4..79adb2e429b6 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,81 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="45b8e2eb-7056-11e8-8fab-63ca6e0e13a2">
+ <topic>node.js -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>node6</name>
+ <range><lt>6.14.3</lt></range>
+ </package>
+ <package>
+ <name>node8</name>
+ <range><lt>8.11.3</lt></range>
+ </package>
+ <package>
+ <name>node</name>
+ <range><lt>10.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Node.js reports:</p>
+ <blockquote cite="https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/">
+ <h1>Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)</h1>
+ <p>All versions of 8.x and later are vulnerable and the severity is
+ HIGH. An attacker can cause a denial of service (DoS) by causing a
+ node server providing an http2 server to crash. This can be
+ accomplished by interacting with the http2 server in a manner that
+ triggers a cleanup bug where objects are used in native code after
+ they are no longer available. This has been addressed by updating
+ the http2 implementation. Thanks to Jordan Zebor at F5 Networks for
+ reporting this issue.</p>
+ <h1>Denial of Service, nghttp2 dependency (CVE-2018-1000168)</h1>
+ <p>All versions of 9.x and later are vulnerable and the severity is
+ HIGH. Under certain conditions, a malicious client can trigger an
+ uninitialized read (and a subsequent segfault) by sending a
+ malformed ALTSVC frame. This has been addressed through an by
+ updating nghttp2.</p>
+ <h1>Denial of Service Vulnerability in TLS (CVE-2018-7162)</h1>
+ <p>All versions of 9.x and later are vulnerable and the severity is
+ HIGH. An attacker can cause a denial of service (DoS) by causing a
+ node process which provides an http server supporting TLS server to
+ crash. This can be accomplished by sending duplicate/unexpected
+ messages during the handshake. This vulnerability has been addressed
+ by updating the TLS implementation. Thanks to Jordan Zebor at F5
+ Networks all of his help investigating this issue with the Node.js
+ team.</p>
+ <h1>Memory exhaustion DoS on v9.x (CVE-2018-7164)</h1>
+ <p>Versions 9.7.0 and later are vulnerable and the severity is MEDIUM.
+ A bug introduced in 9.7.0 increases the memory consumed when reading
+ from the network into JavaScript using the net.Socket object
+ directly as a stream. An attacker could use this cause a denial of
+ service by sending tiny chunks of data in short succession. This
+ vulnerability was restored by reverting to the prior behaviour.</p>
+ <h1>Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)</h1>
+ <p>Calling Buffer.fill() or Buffer.alloc() with some parameters can
+ lead to a hang which could result in a Denial of Service. In order
+ to address this vulnerability, the implementations of Buffer.alloc()
+ and Buffer.fill() were updated so that they zero fill instead of
+ hanging in these cases.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nodejs.org/en/blog/vulnerability/june-2018-security-releases/</url>
+ <url>https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/</url>
+ <cvename>CVE-2018-7161</cvename>
+ <cvename>CVE-2018-7162</cvename>
+ <cvename>CVE-2018-7164</cvename>
+ <cvename>CVE-2018-7167</cvename>
+ <cvename>CVE-2018-1000168</cvename>
+ </references>
+ <dates>
+ <discovery>2018-06-12</discovery>
+ <entry>2018-06-15</entry>
+ </dates>
+ </vuln>
+
<vuln vid="53eb9e1e-7014-11e8-8b1f-3065ec8fd3ec">
<topic>password-store -- GPG parsing vulnerabilities</topic>
<affects>