<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2496-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-10-11T13:51:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-10-11T13:51:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-10-11T13:51:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update brings the new upstream nodejs LTS version 4.6.0, fixing bugs and security issues:

* Nodejs embedded openssl version update
    + upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183, CVE-2016-2178,
      CVE-2016-6306, CVE-2016-7052)
    + remove support for dynamic 3rd party engine modules
* http: Properly validate for allowable characters in input
  user data. This introduces a new case where throw may occur
  when configuring HTTP responses, users should already
  be adopting try/catch here. (CVE-2016-5325, bsc#985201)
* tls: properly validate wildcard certificates
  (CVE-2016-7099, bsc#1001652)
* buffer: Zero-fill excess bytes in new Buffer objects created
  with Buffer.concat()
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2496-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-4.6.0-33.1">
      <FullProductName ProductID="nodejs-4.6.0-33.1">nodejs-4.6.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-devel-4.6.0-33.1">
      <FullProductName ProductID="nodejs-devel-4.6.0-33.1">nodejs-devel-4.6.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs-docs-4.6.0-33.1">
      <FullProductName ProductID="nodejs-docs-4.6.0-33.1">nodejs-docs-4.6.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm-4.6.0-33.1">
      <FullProductName ProductID="npm-4.6.0-33.1">npm-4.6.0-33.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs-4.6.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:nodejs-4.6.0-33.1">nodejs-4.6.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-devel-4.6.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1">nodejs-devel-4.6.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs-docs-4.6.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1">nodejs-docs-4.6.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm-4.6.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:npm-4.6.0-33.1">npm-4.6.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Zone::New function in zone.cc in Google V8 before 5.0.71.47, as used in Google Chrome before 50.0.2661.102, does not properly determine when to expand certain memory allocations, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-1669</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1669.html</URL>
        <Description>CVE-2016-1669</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/979859</URL>
        <Description>SUSE Bug 979859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/987919</URL>
        <Description>SUSE Bug 987919</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.</Note>
    </Notes>
    <CVE>CVE-2016-2178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.2</BaseScore>
        <Vector>AV:L/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2178.html</URL>
        <Description>CVE-2016-2178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983249</URL>
        <Description>SUSE Bug 983249</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983519</URL>
        <Description>SUSE Bug 983519</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.</Note>
    </Notes>
    <CVE>CVE-2016-2183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2183.html</URL>
        <Description>CVE-2016-2183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001912</URL>
        <Description>SUSE Bug 1001912</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1020747</URL>
        <Description>SUSE Bug 1020747</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1024218</URL>
        <Description>SUSE Bug 1024218</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1027038</URL>
        <Description>SUSE Bug 1027038</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1034689</URL>
        <Description>SUSE Bug 1034689</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1171693</URL>
        <Description>SUSE Bug 1171693</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994844</URL>
        <Description>SUSE Bug 994844</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/995359</URL>
        <Description>SUSE Bug 995359</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">CRLF injection vulnerability in the ServerResponse#writeHead function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via the reason argument.</Note>
    </Notes>
    <CVE>CVE-2016-5325</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5325.html</URL>
        <Description>CVE-2016-5325</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985201</URL>
        <Description>SUSE Bug 985201</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/985202</URL>
        <Description>SUSE Bug 985202</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.</Note>
    </Notes>
    <CVE>CVE-2016-6304</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6304.html</URL>
        <Description>CVE-2016-6304</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001706</URL>
        <Description>SUSE Bug 1001706</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1003811</URL>
        <Description>SUSE Bug 1003811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1005579</URL>
        <Description>SUSE Bug 1005579</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021375</URL>
        <Description>SUSE Bug 1021375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999666</URL>
        <Description>SUSE Bug 999666</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.</Note>
    </Notes>
    <CVE>CVE-2016-6306</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6306.html</URL>
        <Description>CVE-2016-6306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999665</URL>
        <Description>SUSE Bug 999665</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999668</URL>
        <Description>SUSE Bug 999668</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crypto/x509/x509_vfy.c in OpenSSL 1.0.2i allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by triggering a CRL operation.</Note>
    </Notes>
    <CVE>CVE-2016-7052</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7052.html</URL>
        <Description>CVE-2016-7052</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001148</URL>
        <Description>SUSE Bug 1001148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The tls.checkServerIdentity function in Node.js 0.10.x before 0.10.47, 0.12.x before 0.12.16, 4.x before 4.6.0, and 6.x before 6.7.0 does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2016-7099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:nodejs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-devel-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:nodejs-docs-4.6.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:npm-4.6.0-33.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>8.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-7099.html</URL>
        <Description>CVE-2016-7099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1001652</URL>
        <Description>SUSE Bug 1001652</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
