Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 13 Jul 2017 10:57:19 +0000 (UTC)
From:      "Bradley T. Hughes" <bhughes@FreeBSD.org>
To:        ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org
Subject:   svn commit: r445644 - head/security/vuxml
Message-ID:  <201707131057.v6DAvJWH021314@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: bhughes
Date: Thu Jul 13 10:57:18 2017
New Revision: 445644
URL: https://svnweb.freebsd.org/changeset/ports/445644

Log:
  ecurity/vuxml: add node.js vulnerabilities announced 2017-07-11
  
  The vulnerability in the bundled c-ares dependency is not included,
  since the Node.js ports use dns/c-ares as a dependency instead.
  
  Approved by:	mat (co-mentor)
  MFH:		2017Q3
  Security:	http://www.vuxml.org/freebsd/3eff66c5-66c9-11e7-aa1d-3d2e663cef42.html
  Differential Revision:	https://reviews.freebsd.org/D11561

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Thu Jul 13 10:52:33 2017	(r445643)
+++ head/security/vuxml/vuln.xml	Thu Jul 13 10:57:18 2017	(r445644)
@@ -58,6 +58,60 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">;
+  <vuln vid="3eff66c5-66c9-11e7-aa1d-3d2e663cef42">
+    <topic>node.js -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>node</name>
+	<range><lt>8.1.4</lt></range>
+      </package>
+      <package>
+	<name>node4</name>
+	<range><lt>4.8.4</lt></range>
+      </package>
+      <package>
+	<name>node6</name>
+	<range><lt>6.11.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">;
+	<p>Updates are now available for all active Node.js release lines as
+	  well as the 7.x line. These include the fix for the high severity
+	  vulnerability identified in the initial announcement, one additional
+	  lower priority Node.js vulnerability in the 4.x release line, as well
+	  as some lower priority fixes for Node.js dependencies across the
+	  current release lines.</p>
+	<blockquote cite="https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/">;
+	  <h2>Constant Hashtable Seeds (CVE pending)</h2>
+	  <p>Node.js was susceptible to hash flooding remote DoS attacks as the
+	    HashTable seed was constant across a given released version of
+	    Node.js. This was a result of building with V8 snapshots enabled by
+	    default which caused the initially randomized seed to be overwritten
+	    on startup. Thanks to Jann Horn of Google Project Zero for reporting
+	    this vulnerability.</p>
+	  <p>This is a high severity vulnerability and applies to all active
+	    release lines (4.x, 6.x, 8.x) as well as the 7.x line.</p>
+	  <h2>http.get with numeric authorization options creates uninitialized
+	    buffers</h2>
+	  <p>Application code that allows the auth field of the options object
+	    used with http.get() to be set to a number can result in an
+	    uninitialized buffer being created/used as the authentication
+	    string.</p>
+	  <p>This is a low severity defect and only applies to the 4.x release
+	    line.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>https://nodejs.org/en/blog/vulnerability/july-2017-security-releases/</url>;
+    </references>
+    <dates>
+      <discovery>2017-06-27</discovery>
+      <entry>2017-07-12</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="b28adc5b-6693-11e7-ad43-f0def16c5c1b">
     <topic>nginx -- a specially crafted request might result in an integer overflow</topic>
     <affects>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201707131057.v6DAvJWH021314>