node-request: CVE-2017-16026: remote memory exposure

Related Vulnerabilities: CVE-2017-16026  

Debian Bug report logs - #901708
node-request: CVE-2017-16026: remote memory exposure

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sun, 17 Jun 2018 07:21:02 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in version node-request/2.26.1-1

Fixed in version node-request/2.88.1-1

Done: Xavier <yadd@debian.org>

Bug is archived. No further changes may be made.

Forwarded to https://github.com/request/request/issues/1904

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>:
Bug#901708; Package src:node-request. (Sun, 17 Jun 2018 07:21:04 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, team@security.debian.org, Debian Javascript Maintainers <pkg-javascript-devel@lists.alioth.debian.org>. (Sun, 17 Jun 2018 07:21:04 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: node-request: CVE-2017-16026: remote memory exposure
Date: Sun, 17 Jun 2018 09:17:52 +0200
Source: node-request
Version: 2.26.1-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/request/request/issues/1904

Hi,

The following vulnerability was published for node-request.

CVE-2017-16026[0]:
| Request is an http client. If a request is made using ```multipart```,
| and the body type is a ```number```, then the specified number of
| non-zero memory is passed in the body. This affects Request &gt;=2.2.6
| &lt;2.47.0 || &gt;2.51.0 &lt;=2.67.0.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2017-16026
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16026
[1] https://github.com/request/request/issues/1904
[2] https://nodesecurity.io/advisories/309
[3] https://github.com/request/request/pull/2018

Regards,
Salvatore



Added tag(s) fixed-upstream. Request was from debian-bts-link@lists.debian.org to control@bugs.debian.org. (Thu, 21 Jun 2018 17:30:17 GMT) (full text, mbox, link).


Marked as fixed in versions node-request/2.88.1-1. Request was from Xavier <yadd@debian.org> to control@bugs.debian.org. (Sun, 21 Apr 2019 12:00:02 GMT) (full text, mbox, link).


Reply sent to Xavier <yadd@debian.org>:
You have taken responsibility. (Sun, 21 Apr 2019 12:00:05 GMT) (full text, mbox, link).


Notification sent to Salvatore Bonaccorso <carnil@debian.org>:
Bug acknowledged by developer. (Sun, 21 Apr 2019 12:00:05 GMT) (full text, mbox, link).


Message #14 received at 901708-done@bugs.debian.org (full text, mbox, reply):

From: Xavier <yadd@debian.org>
To: 901708-done@bugs.debian.org, Debian bugs control <control@bugs.debian.org>
Subject: Already fixed
Date: Sun, 21 Apr 2019 13:57:25 +0200
fixed 901708 2.88.1-1

stop

Hi all,

Issue was fixed in upstream version 2.68.0

Cheers,
Xavier



Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Mon, 20 May 2019 07:25:23 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 17:17:11 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.