<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for nodejs8</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:1963-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-07-13T17:59:41Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-07-13T17:59:41Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-07-13T17:59:41Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for nodejs8</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for nodejs8 to version 8.11.3 fixes the following issues:

These security issues were fixed:

- CVE-2018-7167: Calling Buffer.fill() or Buffer.alloc() with some parameters
  could have lead to a hang which could have resulted in a DoS (bsc#1097375).
- CVE-2018-7161: By interacting with the http2 server in a manner that
  triggered a cleanup bug where objects are used in native code after they are no
  longer available an attacker could have caused a denial of service (DoS) by
  causing a node server providing an http2 server to crash (bsc#1097404).
- CVE-2018-1000168: Fixed a denial of service vulnerability by unbundling
  nghttp2 (bsc#1097401)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:1963-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.0">
      <Branch Type="Product Name" Name="openSUSE Leap 15.0">
        <FullProductName ProductID="openSUSE Leap 15.0">openSUSE Leap 15.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="nodejs8-8.11.3-lp150.2.3.1">
      <FullProductName ProductID="nodejs8-8.11.3-lp150.2.3.1">nodejs8-8.11.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs8-devel-8.11.3-lp150.2.3.1">
      <FullProductName ProductID="nodejs8-devel-8.11.3-lp150.2.3.1">nodejs8-devel-8.11.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="nodejs8-docs-8.11.3-lp150.2.3.1">
      <FullProductName ProductID="nodejs8-docs-8.11.3-lp150.2.3.1">nodejs8-docs-8.11.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="npm8-8.11.3-lp150.2.3.1">
      <FullProductName ProductID="npm8-8.11.3-lp150.2.3.1">npm8-8.11.3-lp150.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="nodejs8-8.11.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:nodejs8-8.11.3-lp150.2.3.1">nodejs8-8.11.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs8-devel-8.11.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:nodejs8-devel-8.11.3-lp150.2.3.1">nodejs8-devel-8.11.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="nodejs8-docs-8.11.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:nodejs8-docs-8.11.3-lp150.2.3.1">nodejs8-docs-8.11.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="npm8-8.11.3-lp150.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.0">
      <FullProductName ProductID="openSUSE Leap 15.0:npm8-8.11.3-lp150.2.3.1">npm8-8.11.3-lp150.2.3.1 as a component of openSUSE Leap 15.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">nghttp2 version &gt;= 1.10.0 and nghttp2 &lt;= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in &gt;= 1.31.1.</Note>
    </Notes>
    <CVE>CVE-2018-1000168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:nodejs8-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-devel-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-docs-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:npm8-8.11.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-1000168.html</URL>
        <Description>CVE-2018-1000168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1088639</URL>
        <Description>SUSE Bug 1088639</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097401</URL>
        <Description>SUSE Bug 1097401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.</Note>
    </Notes>
    <CVE>CVE-2018-7161</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:nodejs8-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-devel-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-docs-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:npm8-8.11.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7161.html</URL>
        <Description>CVE-2018-7161</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097404</URL>
        <Description>SUSE Bug 1097404</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.</Note>
    </Notes>
    <CVE>CVE-2018-7167</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.0:nodejs8-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-devel-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:nodejs8-docs-8.11.3-lp150.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.0:npm8-8.11.3-lp150.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-07/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-7167.html</URL>
        <Description>CVE-2018-7167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097375</URL>
        <Description>SUSE Bug 1097375</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
