Skip to content

Commit ae16aca

Browse files
mhdawsonMylesBorins
authored andcommitted
doc: june 2018 sec announce release avail
1 parent fdd9804 commit ae16aca

File tree

2 files changed

+82
-6
lines changed

2 files changed

+82
-6
lines changed

build.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -255,7 +255,7 @@ function getSource (callback) {
255255
},
256256
banner: {
257257
visible: true,
258-
text: 'June 2018 Security Releases',
258+
text: 'Important June 2018 security upgrades now available',
259259
link: '/en/blog/vulnerability/june-2018-security-releases/'
260260
}
261261
}

locale/en/blog/vulnerability/june-2018-security-releases.md

Lines changed: 81 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,28 +1,104 @@
11
---
2-
date: 2018-06-06T03:18:59.230Z
2+
date: 2018-06-12T23:00:59.230Z
33
category: vulnerability
44
title: June 2018 Security Releases
55
slug: june-2018-security-releases
66
layout: blog-post.hbs
77
author: Michael Dawson
88
---
99

10+
_(Update 12-June-2018)_ Security releases available
11+
1012
# Summary
1113

14+
Updates are now available for all active Node.js release lines. These include the fix for the vulnerabilities identified in the initial announcement (below).
15+
16+
We recommend that all users upgrade as soon as possible.
17+
18+
# Downloads & release details
19+
20+
* [Node.js 10.4.1 (Current)](https://nodejs.org/en/blog/release/v10.4.1)
21+
* [Node.js 9.11.2](https://nodejs.org/en/blog/release/v9.11.2)
22+
* [Node.js 8.11.3 (LTS "Carbon")](https://nodejs.org/en/blog/release/v8.11.3)
23+
* [Node.js 6.14.3 (LTS "Boron")](https://nodejs.org/en/blog/release/v6.14.3)
24+
25+
## Denial of Service Vulnerability in HTTP/2 (CVE-2018-7161)
26+
27+
All versions of 8.x and later are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation. Thanks to Jordan Zebor at F5 Networks for reporting this issue.
28+
29+
**Impact:**
30+
31+
* All versions of Node.js 6.x (LTS "Boron") **are** NOT vulnerable
32+
* All versions of Node.js 8.x (LTS "Carbon") **are** vulnerable
33+
* All versions of Node.js 9.x **are** vulnerable
34+
* All versions of Node.js 10.x (Current) **are** vulnerable
35+
36+
## Denial of Service, nghttp2 dependency (CVE-2018-1000168)
37+
38+
All versions of 9.x and later are vulnerable and the severity is HIGH. Under certain conditions, a malicious client can trigger an uninitialized read (and a subsequent segfault) by sending a malformed ALTSVC frame. This has been addressed through an by updating nghttp2. For further detail: https://nghttp2.org/blog/2018/04/12/nghttp2-v1-31-1/.
39+
40+
**Impact:**
41+
* All versions of Node.js 6.x (LTS "Boron") **are NOT** vulnerable
42+
* Versions of Node.js 8.4.x and higher (LTS "Carbon") **are** vulnerable
43+
* All versions of Node.js 9.x **are** vulnerable
44+
* All versions of Node.js 10.x (Current) **are** vulnerable
45+
46+
## Denial of Service Vulnerability in TLS (CVE-2018-7162)
47+
48+
All versions of 9.x and later are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node process which provides an http server supporting TLS server to crash. This can be accomplished by sending duplicate/unexpected messages during the handshake. This vulnerability has been addressed by updating the TLS implementation. Thanks to Jordan Zebor at F5 Networks all of his help investigating this issue with the Node.js team.
49+
50+
**Impact:**
51+
* All versions of Node.js 6.x (LTS "Boron") **are NOT** vulnerable
52+
* All versions of Node.js 8.x (LTS "Carbon") **are NOT** vulnerable
53+
* All versions of Node.js 9.x **are** vulnerable
54+
* All versions of Node.js 10.x (Current) **are** vulnerable
55+
56+
## Memory exhaustion DoS on v9.x (CVE-2018-7164)
57+
58+
Versions 9.7.0 and later are vulnerable and the severity is MEDIUM. A bug introduced in 9.7.0 increases the memory consumed when reading from the network into JavaScript using the net.Socket object directly as a stream. An attacker could use this cause a denial of service by sending tiny chunks of data in short succession. This vulnerability was restored by reverting to the prior behaviour.
59+
60+
**Impact:**
61+
* All versions of Node.js 6.x (LTS "Boron") **are NOT** vulnerable
62+
* All versions of Node.js 8.x (LTS "Carbon") **are NOT** vulnerable
63+
* Versions of Node.js 9.7.0 and higher **are** vulnerable
64+
* All versions of Node.js 10.x (Current) **are** vulnerable
65+
66+
## Calls to Buffer.fill() and/or Buffer.alloc() may hang (CVE-2018-7167)
67+
68+
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. The following examples show the cases which hang:
69+
70+
Buffer.alloc(100).fill(Buffer.alloc(0))
71+
Buffer.alloc(100).fill(Buffer.from(''))
72+
Buffer.alloc(100).fill(new Uint8Array([]))
73+
Buffer.alloc(100, Buffer.alloc(0))
74+
Buffer.alloc(100, new Uint8Array([]))
75+
new Buffer(10).fill(new Buffer(''))
76+
77+
In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases.
78+
79+
All versions of Node.js 6.x (LTS "Boron") are vulnerable
80+
All versions of Node.js 8.x (LTS "Carbon") are vulnerable
81+
All versions of Node.js 9.x are vulnerable
82+
All versions of Node.js 10.x (Current) are NOT vulnerable
83+
84+
***Original post is included below***
85+
86+
## Summary
87+
1288
Node.js will release new versions of all supported release lines on or around June 12th, 2018 (UTC). These releases will incorporate a number of security fixes.
1389

14-
# Impact
90+
## Impact
1591

1692
* All versions of Node.js 6.x (LTS "Boron") are vulnerable to 1 denial-of-service (DoS) vulnerability with a severity of LOW.
17-
* All versions of Node.js 8.x (LTS "Carbon") are vulnerable to 2 denial-of-service (DoS) vulnerabilities, the highest severity being HIGH.
93+
* All versions of Node.js 8.x (LTS "Carbon") are vulnerable to 2 denial-of-service (DoS) vulnerabilities, the highest severity being HIGH (**Node** This should have said 3).
1894
* Versions of Node.js 9.x are vulnerable to 5 denial-of-service (DoS) vulnerabilities, the highest severity being HIGH.
1995
* All versions of Node.js 10.x (Current) are vulnerable to 4 denial-of-service (DoS) vulnerabilities, the highest severity being HIGH.
2096

21-
# Release timing
97+
## Release timing
2298

2399
Releases will be available on or around June 12th, 2018 (UTC), along with disclosure of the details for the flaws addressed in each release in order to allow for complete impact assessment by users.
24100

25-
# Contact and future updates
101+
## Contact and future updates
26102

27103
The current Node.js security policy can be found at https://nodejs.org/en/security/.
28104

0 commit comments

Comments
 (0)