Bug 1239332 (CVE-2015-5380)
Summary: | CVE-2015-5380 nodejs: `Buffer` to UTF8 `String` conversion DoS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | T.C. Hollingsworth <tchollingsworth> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED WONTFIX | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | jrusnack, vkaigoro |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-08-11 17:50:13 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1240727 |
Description
T.C. Hollingsworth
2015-07-05 19:35:35 UTC
NodeJS commit: https://github.com/joyent/node/commit/78b0e30954111cfaba0edbeee85450d8cbc6fdf6 Upstream V8 commit: https://chromium.googlesource.com/v8/v8.git/+/b199bcdd47ae97ec116b430e34ab42001c8f04c0%5E!/#F2 MITRE has assigned CVE-2015-5380 to this vulnerability. OpenStack uses MongoDB which uses v8 on the back end, as such exploitation of this issue would be very difficult and the impact is limited. Satellite, SAM and OpenShift are all affected minimally, exploitation is relatively difficult and the impact of exploitation is limited. At this time, we have no additional z-streams planned for sat-6.5.z. Based upon that and that this is a low severity issue, closing this one as wontfix. Ref: https://access.redhat.com/support/policy/updates/satellite Statement: This issue affects the versions of nodejs as shipped with various Red Hat Enterprise products. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Red Hat Satellite 6.5 ship v8 however has been rated as a security impact of Moderate, product version Satellite 6.6 onward is not affected. Satellite 6.5 is in Maintenance Support phase of the product life cycle and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Satellite 6 Life Cycle: https://access.redhat.com/support/policy/updates/satellite. |