Bug 1576651 (CVE-2018-3736)
Summary: | CVE-2018-3736 nodejs-https-proxy-agent: Unsanitized options passed to Buffer() allow for denial of service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Sam Fowler <sfowler> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED DUPLICATE | QA Contact: | |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | unspecified | CC: | dffrench, drusso, hhorak, jmadigan, jorton, jshepherd, lgriffin, lpardo, ngough, nodejs-maint, piotr1212, pwright, rrajasek, sfowler, trepel |
Target Milestone: | --- | Keywords: | Reopened, Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs-https-proxy-agent 2.2.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
[REJECTED CVE] A flaw was found in https-proxy-agent, prior to version 2.2.0. It was discovered https-proxy-agent passes an auth option to the Buffer constructor without proper sanitization. This could result in a Denial of Service through the usage of all available CPU resources and data exposure through an uninitialized memory leak in setups where an attacker could submit typed input to the auth parameter.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-05 14:16:52 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1576652, 1576653 | ||
Bug Blocks: | 1588910 |
Description
Sam Fowler
2018-05-10 04:28:01 UTC
Created nodejs-https-proxy-agent tracking bugs for this issue: Affects: epel-7 [bug 1576652] Affects: fedora-all [bug 1576653] https-proxy-agent is included in supercore by it's dependency on NPM. It doesn't make use of the vulnerable API in the supercore source code. This CVE has been rejected as a duplicate of CVE-2018-3739. See bug 1727312 *** This bug has been marked as a duplicate of bug 1727312 *** Statement: This flaw was found to be a duplicate of CVE-2018-3739. Please see https://access.redhat.com/security/cve/CVE-2018-3739 for information about affected products and security errata. |