Updated nodejs packages fix security vulnerability
Publication date: 21 Sep 2016Type: security
Affected Mageia releases : 5
CVE: CVE-2016-1669
Description
Under certain conditions, V8 may improperly expand memory allocations in the Zone::New function. This could potentially be used to cause a Denial of Service via buffer overflow or as a trigger for a remote code execution (CVE-2016-1669). The primary npm registry has used HTTP bearer tokens to authenticate requests from the npm command-line interface. Due to a design flaw in the CLI, these bearer tokens were sent with every request made by the CLI for logged-in users, regardless of the destination of the request. This flaw allows an attacker to set up an HTTP server that could collect authentication information they could use to impersonate the users whose tokens they collected. This impersonation would allow them to do anything the compromised users could do, including publishing new versions of packages.
References
- https://bugs.mageia.org/show_bug.cgi?id=18481
- https://nodejs.org/en/blog/release/v0.10.44/
- https://nodejs.org/en/blog/release/v0.10.45/
- https://nodejs.org/en/blog/release/v0.10.46/
- https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/
- https://nodejs.org/en/blog/vulnerability/june-2016-security-releases/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669
SRPMS
5/core
- nodejs-0.10.46-1.mga5