You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa nodejs-send

Sigurnosni nedostatak programskog paketa nodejs-send

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2014-11495
2014-09-25 09:38:49
——————————————————————————–

Name : nodejs-send
Product : Fedora 19
Version : 0.3.0
Release : 4.fc19
URL : https://github.com/visionmedia/send
Summary : Better streaming static file server with Range and conditional-GET support
Description :
Send is Connect’s static() extracted for generalized use, a streaming static
file server supporting partial responses (Ranges), conditional-GET
negotiation, high test coverage, and granular events which may be leveraged
to take appropriate actions in your application or framework.

——————————————————————————–
Update Information:

When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, static(_dirname + ‘/public’) would allow access to _dirname + ‘/public-restricted’.

https://nodesecurity.io/advisories/send-directory-traversal
——————————————————————————–
ChangeLog:

* Wed Sep 24 2014 T.C. Hollingsworth <tchollingsworth@gmail.com> – 0.3.0-4
– really apply the patch
* Wed Sep 24 2014 T.C. Hollingsworth <tchollingsworth@gmail.com> – 0.3.0-3
– fix directory traversal vulnerability (RHBZ#1146063)
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 0.3.0-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Fri Apr 25 2014 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.3.0-1
– update to upstream release 0.3.0
* Sat Mar 8 2014 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.2.0-1
– update to upstream release 0.2.0
* Mon Aug 26 2013 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.1.4-1
– update to upstream release 0.1.4
– add ExclusiveArch logic
* Sat Aug 3 2013 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 0.1.2-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_20_Mass_Rebuild
* Fri Jul 5 2013 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.1.2-1
– update to upstream release 0.1.2
– restrict to compatible arches
——————————————————————————–
References:

[ 1 ] Bug #1146063 – CVE-2014-6394 nodejs-send: directory traversal vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1146063
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update nodejs-send’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2014-11421
2014-09-25 09:29:14
——————————————————————————–

Name : nodejs-send
Product : Fedora 20
Version : 0.3.0
Release : 4.fc20
URL : https://github.com/visionmedia/send
Summary : Better streaming static file server with Range and conditional-GET support
Description :
Send is Connect’s static() extracted for generalized use, a streaming static
file server supporting partial responses (Ranges), conditional-GET
negotiation, high test coverage, and granular events which may be leveraged
to take appropriate actions in your application or framework.

——————————————————————————–
Update Information:

When relying on the root option to restrict file access it may be possible for an application consumer to escape out of the restricted directory and access files in a similarly named directory. For example, static(_dirname + ‘/public’) would allow access to _dirname + ‘/public-restricted’.

https://nodesecurity.io/advisories/send-directory-traversal
——————————————————————————–
ChangeLog:

* Wed Sep 24 2014 T.C. Hollingsworth <tchollingsworth@gmail.com> – 0.3.0-4
– really apply the patch
* Wed Sep 24 2014 T.C. Hollingsworth <tchollingsworth@gmail.com> – 0.3.0-3
– fix directory traversal vulnerability (RHBZ#1146063)
* Sat Jun 7 2014 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> – 0.3.0-2
– Rebuilt for https://fedoraproject.org/wiki/Fedora_21_Mass_Rebuild
* Fri Apr 25 2014 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.3.0-1
– update to upstream release 0.3.0
* Sat Mar 8 2014 Jamie Nguyen <jamielinux@fedoraproject.org> – 0.2.0-1
– update to upstream release 0.2.0
——————————————————————————–
References:

[ 1 ] Bug #1146063 – CVE-2014-6394 nodejs-send: directory traversal vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=1146063
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update nodejs-send’ at the command line.
For more information, refer to “Managing Software with yum”,
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2014-10-0009-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa nodejs-qs

Otkriven je sigurnosni nedostatak u programskom paketu nodejs-qs za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje napada uskraćivanja...

Close