Name | CVE-2019-15605 |
Description | HTTP request smuggling in Node.js 10, 12, and 13 causes malicious payload delivery when transfer-encoding is malformed |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4669-1 |
Debian Bugs | 977467 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
http-parser (PTS) | jessie, jessie (lts) | 2.1-2+deb8u1 | vulnerable |
| stretch (lts), stretch | 2.1-2+deb9u1 | vulnerable |
| buster (security), buster, buster (lts) | 2.8.1-1+deb10u3 | fixed |
| bullseye | 2.9.4-4+deb11u1 | fixed |
| bookworm | 2.9.4-5 | fixed |
| sid, trixie | 2.9.4-6 | fixed |
nodejs (PTS) | jessie | 0.10.29~dfsg-2 | vulnerable |
| stretch | 4.8.2~dfsg-1 | vulnerable |
| buster (security), buster, buster (lts) | 10.24.0~dfsg-1~deb10u4 | fixed |
| bullseye | 12.22.12~dfsg-1~deb11u4 | fixed |
| bullseye (security) | 12.22.12~dfsg-1~deb11u5 | fixed |
| bookworm | 18.19.0+dfsg-6~deb12u2 | fixed |
| bookworm (security) | 18.19.0+dfsg-6~deb12u1 | fixed |
| trixie | 20.18.0+dfsg-2 | fixed |
| sid | 20.18.1+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[stretch] - nodejs <ignored> (Nodejs in stretch not covered by security support)
[jessie] - nodejs <end-of-life> (Nodejs in jessie not covered by security support)
[stretch] - http-parser <ignored> (Invasive patch, requires prior content-length support and public struct changes that break ABI)
[jessie] - http-parser <ignored> (Invasive patch, requires prior content-length support and public struct changes that break ABI)
https://hackerone.com/reports/735748
https://github.com/nodejs/http-parser/commit/7d5c99d09f6743b055d53fc3f642746d9801479b (http-parser)
nodejs/10.19.0~dfsg-1 contains both the source fix but switches as well
back to use shared libhttp-parser again.