Community Packages

Please read this before reporting a bug:
http://wiki.archlinux.org/index.php/Reporting_Bug_Guidelines

Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.

REPEAT: Do NOT report bugs for outdated packages!
Tasklist

FS#72412 - [nodejs-lts-erbium] [Security] multiple issues

Attached to Project: Community Packages
Opened by loqs (loqs) - Wednesday, 13 October 2021, 16:48 GMT
Last edited by Bruno Pagani (ArchangeGabriel) - Wednesday, 13 October 2021, 23:25 GMT
Task Type Bug Report
Category Security
Status Closed
Assigned To Levente Polyak (anthraxx)
Bruno Pagani (ArchangeGabriel)
Architecture All
Severity High
Priority Normal
Reported Version
Due in Version Undecided
Due Date Undecided
Percent Complete 100%
Votes 1
Private No

Details

Summary
=======

The package nodejs-lts-erbium is vulnerable to multiple issues including arbitrary code execution, url request injection and certificate verification bypass via CVE-2021-22960, CVE-2021-22959, CVE-2021-22940 and CVE-2021-22939.

Guidance
========

Upgrading to 12.22.7 resolves all the issues but requires patches for current versions of c-ares and libnghttp2 applied in PKGBUILD.diff attached.
ares_compat.patch is from Debian [1] the libnghttp2 patch is from upstream.

References
==========

https://security.archlinux.org/AVG-2285
https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-when-parsing-the-body-medium-cve-2021-22960
https://hackerone.com/reports/1238099
https://hackerone.com/reports/1238709
https://github.com/nodejs/node/commit/af488f8dc82d69847992ea1cd2f53dc8082b3b91
https://github.com/nodejs/node/commit/8c254ca7e4693fb778d808fa835b095de6c9fdd4
https://github.com/nodejs/node/commit/21a2e554e3eaa325abbdb28f366928d0ccc0a0f0
https://nodejs.org/en/blog/vulnerability/oct-2021-security-releases/#http-request-smuggling-due-to-spaced-in-headers-medium-cve-2021-22959
https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/#use-after-free-on-close-http2-on-stream-canceling-high-cve-2021-22940
https://github.com/nodejs/node/pull/39423
https://github.com/nodejs/node/pull/39622
https://github.com/nodejs/node/commit/a3c33d4ce78f74d1cf1765704af5b427aa3840a6
https://github.com/nodejs/node/commit/2008c9722fcf7591e39013691f303934b622df7b
https://nodejs.org/en/blog/vulnerability/aug-2021-security-releases/#incomplete-validation-of-rejectunauthorized-parameter-low-cve-2021-22939
https://hackerone.com/reports/1278254
https://github.com/nodejs-private/node-private/pull/276
https://github.com/nodejs/node/commit/6c7fff6f1d53dfb6c2b184ee41809b8d7614cb80
https://github.com/nodejs/node/commit/35b86110e45083a75d7dc8e6be5a930b262494f6
https://github.com/nodejs/node/commit/1780bbc3291357f7c3370892eb311fc7a62afe8d
[1] https://sources.debian.org/data/main/n/nodejs/12.22.5~dfsg-5/debian/patches/ares_compat.patch
This task depends upon

Closed by  Bruno Pagani (ArchangeGabriel)
Wednesday, 13 October 2021, 23:25 GMT
Reason for closing:  Implemented
Additional comments about closing:  Done, thanks for the information on required patches.

Loading...