CVE-2019-15605

NameCVE-2019-15605
DescriptionHTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-4669-1
Debian Bugs977467

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
http-parser (PTS)jessie, jessie (lts)2.1-2+deb8u1vulnerable
stretch (lts), stretch2.1-2+deb9u1vulnerable
buster (security), buster, buster (lts)2.8.1-1+deb10u3fixed
bullseye2.9.4-4+deb11u1fixed
bookworm2.9.4-5fixed
sid, trixie2.9.4-6fixed
nodejs (PTS)jessie0.10.29~dfsg-2vulnerable
stretch4.8.2~dfsg-1vulnerable
buster (security), buster, buster (lts)10.24.0~dfsg-1~deb10u4fixed
bullseye12.22.12~dfsg-1~deb11u4fixed
bullseye (security)12.22.12~dfsg-1~deb11u5fixed
bookworm18.19.0+dfsg-6~deb12u2fixed
bookworm (security)18.19.0+dfsg-6~deb12u1fixed
sid, trixie20.18.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
http-parsersourcebuster2.8.1-1+deb10u1
http-parsersource(unstable)2.9.4-2977467
nodejssourcejessie(unfixed)end-of-life
nodejssourcebuster10.19.0~dfsg1-1DSA-4669-1
nodejssource(unstable)10.19.0~dfsg-1

Notes

[stretch] - nodejs <ignored> (Nodejs in stretch not covered by security support)
[jessie] - nodejs <end-of-life> (Nodejs in jessie not covered by security support)
[stretch] - http-parser <ignored> (Invasive patch, requires prior content-length support and public struct changes that break ABI)
[jessie] - http-parser <ignored> (Invasive patch, requires prior content-length support and public struct changes that break ABI)
https://hackerone.com/reports/735748
https://github.com/nodejs/http-parser/commit/7d5c99d09f6743b055d53fc3f642746d9801479b (http-parser)
nodejs/10.19.0~dfsg-1 contains both the source fix but switches as well
back to use shared libhttp-parser again.

Search for package or bug name: Reporting problems