diff mbox

[PATCH-2017.02.x] nodejs: security bump to version 6.11.1

Message ID 20170713212631.22939-1-peter@korsgaard.com
State Accepted
Headers show

Commit Message

Peter Korsgaard July 13, 2017, 9:26 p.m. UTC
Fixes CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
is used for parsing NAPTR responses, could be triggered to read memory
outside of the given input buffer if the passed in DNS response packet was
crafted in a particular way.  This patch checks that there is enough data
for the required elements of an NAPTR record (2 int16, 3 bytes for string
lengths) before processing a record.

Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
---
 .../{6.11.0 => 6.11.1}/0001-gyp-force-link-command-to-use-CXX.patch   | 0
 .../0002-inspector-don-t-build-when-ssl-support-is-disabled.patch     | 0
 .../0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch       | 0
 package/nodejs/Config.in                                              | 2 +-
 package/nodejs/nodejs.hash                                            | 4 ++--
 5 files changed, 3 insertions(+), 3 deletions(-)
 rename package/nodejs/{6.11.0 => 6.11.1}/0001-gyp-force-link-command-to-use-CXX.patch (100%)
 rename package/nodejs/{6.11.0 => 6.11.1}/0002-inspector-don-t-build-when-ssl-support-is-disabled.patch (100%)
 rename package/nodejs/{6.11.0 => 6.11.1}/0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch (100%)

Comments

Peter Korsgaard July 14, 2017, 1:17 p.m. UTC | #1
>>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:

 > Fixes CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
 > is used for parsing NAPTR responses, could be triggered to read memory
 > outside of the given input buffer if the passed in DNS response packet was
 > crafted in a particular way.  This patch checks that there is enough data
 > for the required elements of an NAPTR record (2 int16, 3 bytes for string
 > lengths) before processing a record.

 > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>

Committed to 2017.02.x, thanks.
Thomas Petazzoni July 15, 2017, 9:36 a.m. UTC | #2
Hello,

On Fri, 14 Jul 2017 15:17:24 +0200, Peter Korsgaard wrote:
> >>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:  
> 
>  > Fixes CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
>  > is used for parsing NAPTR responses, could be triggered to read memory
>  > outside of the given input buffer if the passed in DNS response packet was
>  > crafted in a particular way.  This patch checks that there is enough data
>  > for the required elements of an NAPTR record (2 int16, 3 bytes for string
>  > lengths) before processing a record.  
> 
>  > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>  
> 
> Committed to 2017.02.x, thanks.

For some reason, the status of this patch hadn't been updated to
"Accepted" in patchwork, so I've done so now.

Thomas
Peter Korsgaard July 15, 2017, 2:28 p.m. UTC | #3
>>>>> "Thomas" == Thomas Petazzoni <thomas.petazzoni@free-electrons.com> writes:

 > Hello,
 > On Fri, 14 Jul 2017 15:17:24 +0200, Peter Korsgaard wrote:
 >> >>>>> "Peter" == Peter Korsgaard <peter@korsgaard.com> writes:  
 >> 
 >> > Fixes CVE-2017-1000381 - The c-ares function ares_parse_naptr_reply(), which
 >> > is used for parsing NAPTR responses, could be triggered to read memory
 >> > outside of the given input buffer if the passed in DNS response packet was
 >> > crafted in a particular way.  This patch checks that there is enough data
 >> > for the required elements of an NAPTR record (2 int16, 3 bytes for string
 >> > lengths) before processing a record.  
 >> 
 >> > Signed-off-by: Peter Korsgaard <peter@korsgaard.com>  
 >> 
 >> Committed to 2017.02.x, thanks.

 > For some reason, the status of this patch hadn't been updated to
 > "Accepted" in patchwork, so I've done so now.

Probably because I forgot to run my script. Almost all commits to the
2017.02.x are just cherry picks of other commits, so I normally don't
need to update patchwork.

Thanks for fixing it.
diff mbox

Patch

diff --git a/package/nodejs/6.11.0/0001-gyp-force-link-command-to-use-CXX.patch b/package/nodejs/6.11.1/0001-gyp-force-link-command-to-use-CXX.patch
similarity index 100%
rename from package/nodejs/6.11.0/0001-gyp-force-link-command-to-use-CXX.patch
rename to package/nodejs/6.11.1/0001-gyp-force-link-command-to-use-CXX.patch
diff --git a/package/nodejs/6.11.0/0002-inspector-don-t-build-when-ssl-support-is-disabled.patch b/package/nodejs/6.11.1/0002-inspector-don-t-build-when-ssl-support-is-disabled.patch
similarity index 100%
rename from package/nodejs/6.11.0/0002-inspector-don-t-build-when-ssl-support-is-disabled.patch
rename to package/nodejs/6.11.1/0002-inspector-don-t-build-when-ssl-support-is-disabled.patch
diff --git a/package/nodejs/6.11.0/0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch b/package/nodejs/6.11.1/0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch
similarity index 100%
rename from package/nodejs/6.11.0/0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch
rename to package/nodejs/6.11.1/0003-src-add-HAVE_OPENSSL-directive-to-openssl_config.patch
diff --git a/package/nodejs/Config.in b/package/nodejs/Config.in
index be20af56d6..31dcfb67d9 100644
--- a/package/nodejs/Config.in
+++ b/package/nodejs/Config.in
@@ -43,7 +43,7 @@  config BR2_PACKAGE_NODEJS_V8_ARCH_SUPPORTS
 
 config BR2_PACKAGE_NODEJS_VERSION_STRING
 	string
-	default "6.11.0"		if BR2_PACKAGE_NODEJS_V8_ARCH_SUPPORTS
+	default "6.11.1"		if BR2_PACKAGE_NODEJS_V8_ARCH_SUPPORTS
 	default "0.10.48"
 
 config BR2_PACKAGE_NODEJS_NPM
diff --git a/package/nodejs/nodejs.hash b/package/nodejs/nodejs.hash
index ac010ab6d6..2dbbdc7cc2 100644
--- a/package/nodejs/nodejs.hash
+++ b/package/nodejs/nodejs.hash
@@ -1,5 +1,5 @@ 
 # From upstream URL: http://nodejs.org/dist/v0.10.48/SHASUMS256.txt
 sha256  365a93d9acc076a0d93f087d269f376abeebccad599a9dab72f2f6ed96c8ae6e  node-v0.10.48.tar.xz
 
-# From upstream URL: http://nodejs.org/dist/v6.11.0/SHASUMS256.txt
-sha256  02ba35391edea2b294c736489af01954ce6e6c39d318f4423ae6617c69ef0a51  node-v6.11.0.tar.xz
+# From upstream URL: http://nodejs.org/dist/v6.11.1/SHASUMS256.txt
+sha256  6f6655b85919aa54cb045a6d69a226849802fcc26491d0db4ce59873e41cc2b8  node-v6.11.1.tar.xz