Your message dated Sun, 13 Aug 2017 13:49:42 +0000
with message-id <e1dgtgw-000du6...@fasolo.debian.org>
and subject line Bug#863480: fixed in node-static-module 1.5.0-1
has caused the Debian Bug report #863480,
regarding [node-static-module] Uninitialized Memory Exposure
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
863480: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863480
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: node-static-module
Version: 1.3.1-1
Severity: grave
Tags: patch security fixed-upstream
X-Debbugs-CC: secure-testing-t...@lists.alioth.debian.org
forwarded: https://snyk.io/vuln/npm:concat-stream:20160901

concat-stream is writable stream that concatenates strings or binary data and 
calls a callback with the result. Affected versions of the package are 
vulnerable to Uninitialized Memory Exposure.

A possible memory disclosure vulnerability exists when a value of type number 
is provided to the stringConcat() method and results in concatination of 
uninitialized memory to the stream collection.

This is a result of unobstructed use of the Buffer constructor, whose insecure 
default constructor increases the odds of memory leakage.
Details

Constructing a Buffer class with integer N creates a Buffer of length N with 
raw (not "zero-ed") memory.

In the following example, the first call would allocate 100 bytes of memory, 
while the second example will allocate the memory needed for the string "100":

// uninitialized Buffer of length 100
x = new Buffer(100);
// initialized Buffer with value of '100'
x = new Buffer('100');

concat-stream's stringConcat function uses the default Buffer constructor as-
is, making it easy to append uninitialized memory to an existing list. If the 
value of the buffer list is exposed to users, it may expose raw server side 
memory, potentially holding secrets, private data and code. This is a similar 
vulnerability to the infamous Heartbleed flaw in OpenSSL.

You can read more about the insecure Buffer behavior on our blog.

Similar vulnerabilities were discovered in request, mongoose, ws and 
sequelize.

Attachment: signature.asc
Description: This is a digitally signed message part.


--- End Message ---
--- Begin Message ---
Source: node-static-module
Source-Version: 1.5.0-1

We believe that the bug you reported is fixed in the latest version of
node-static-module, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 863...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Bastien Roucariès <ro...@debian.org> (supplier of updated node-static-module 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 27 May 2017 16:29:32 +0200
Source: node-static-module
Binary: node-static-module
Architecture: source
Version: 1.5.0-1
Distribution: unstable
Urgency: high
Maintainer: Debian Javascript Maintainers 
<pkg-javascript-devel@lists.alioth.debian.org>
Changed-By: Bastien Roucariès <ro...@debian.org>
Description:
 node-static-module - convert module usage to inline expressions
Closes: 863480
Changes:
 node-static-module (1.5.0-1) unstable; urgency=high
 .
   * Security bug fix: Uninitialized Memory Exposure
     (Closes: #863480).
Checksums-Sha1:
 c03bfadef6e44a1b539cc404b1c3e4e69359d043 2758 node-static-module_1.5.0-1.dsc
 4a768c9deb5abe7af2f8d8a1b86e69ccf88ff0d2 10219 
node-static-module_1.5.0.orig.tar.gz
 1d2264845a295787507e64104c3a653852b5e18d 4000 
node-static-module_1.5.0-1.debian.tar.xz
 16d8dab09ed2cdcb9dca3e6e949e51ab9dfa926d 6894 
node-static-module_1.5.0-1_source.buildinfo
Checksums-Sha256:
 f0dc30dd0d921c87ac10bb498d72dc58fb930a2d7e54dea1f9392875a9a21802 2758 
node-static-module_1.5.0-1.dsc
 3b089685081d2380d06f0eff90be3eecb2c3d9f840139f25d2b332b07b0f9779 10219 
node-static-module_1.5.0.orig.tar.gz
 7667491a46aac6c67218b5a2892392a7fef2ea99a16e5e1143beec1ea30a7463 4000 
node-static-module_1.5.0-1.debian.tar.xz
 e5934ae1145ffcc3b59afea264e9c4ab41daf76fd814ff4bd339a8e4268ba6de 6894 
node-static-module_1.5.0-1_source.buildinfo
Files:
 0a517e39c42d2416de5f16be949ee5da 2758 web optional 
node-static-module_1.5.0-1.dsc
 b03492be9cb98c8eb7a0d5662c76349c 10219 web optional 
node-static-module_1.5.0.orig.tar.gz
 a38fe095807aec621c1c7bde82bb7945 4000 web optional 
node-static-module_1.5.0-1.debian.tar.xz
 d7c7e652689539ffc870be6df83e73f4 6894 web optional 
node-static-module_1.5.0-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=+ApZ
-----END PGP SIGNATURE-----

--- End Message ---
-- 
Pkg-javascript-devel mailing list
Pkg-javascript-devel@lists.alioth.debian.org
http://lists.alioth.debian.org/cgi-bin/mailman/listinfo/pkg-javascript-devel

Reply via email to