Upstream information

CVE-2019-5737 at MITRE

Description

An attacker can cause a Denial of Service (DoS) by establishing an HTTP or HTTPS connection in keep-alive mode and by sending headers very slowly thereby keeping the connection and associated resources alive for a long period of time. Attack potential is mitigated by the use of a load balancer or other proxy layer. This vulnerability is an extension of CVE-2018-12121, addressed in November and impacts all active Node.js release lines including 6.x before 6.17.0, 8.x before 8.15.1, 10.x before 10.15.2, and 11.x before 11.10.1.

SUSE information

CVSS v3 Scores
  National Vulnerability Database SUSE
Base Score 7.5 5.3
Vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Access Vector Network Network
Access Complexity Low Low
Privileges Required None None
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact None None
Integrity Impact None None
Availability Impact High Low
SUSE Bugzilla entry: 1127532 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Enterprise Storage 4
  • nodejs4 >= 4.9.1-15.20.1
  • nodejs6 >= 6.17.0-11.24.1
Patchnames:
SUSE-Storage-4-2019-658
SUSE-Storage-4-2019-818
SUSE Linux Enterprise Module for Web Scripting 12
  • nodejs10 >= 10.15.2-1.6.1
  • nodejs10-devel >= 10.15.2-1.6.1
  • nodejs10-docs >= 10.15.2-1.6.1
  • nodejs4 >= 4.9.1-15.20.1
  • nodejs4-devel >= 4.9.1-15.20.1
  • nodejs4-docs >= 4.9.1-15.20.1
  • nodejs6 >= 6.17.0-11.24.1
  • nodejs6-devel >= 6.17.0-11.24.1
  • nodejs6-docs >= 6.17.0-11.24.1
  • npm10 >= 10.15.2-1.6.1
  • npm4 >= 4.9.1-15.20.1
  • npm6 >= 6.17.0-11.24.1
Patchnames:
SUSE-SLE-Module-Web-Scripting-12-2019-636
SUSE-SLE-Module-Web-Scripting-12-2019-658
SUSE-SLE-Module-Web-Scripting-12-2019-818
SUSE Linux Enterprise Module for Web Scripting 15
  • nodejs10 >= 10.15.2-1.6.1
  • nodejs10-devel >= 10.15.2-1.6.1
  • nodejs10-docs >= 10.15.2-1.6.1
  • nodejs8 >= 8.15.1-3.14.1
  • nodejs8-devel >= 8.15.1-3.14.1
  • nodejs8-docs >= 8.15.1-3.14.1
  • npm10 >= 10.15.2-1.6.1
  • npm8 >= 8.15.1-3.14.1
Patchnames:
SUSE-SLE-Module-Web-Scripting-15-2019-627
SUSE-SLE-Module-Web-Scripting-15-2019-635
SUSE OpenStack Cloud 7
  • nodejs6 >= 6.17.0-11.24.1
Patchnames:
SUSE-OpenStack-Cloud-7-2019-818
SUSE OpenStack Cloud Crowbar 8
  • nodejs6 >= 6.17.0-11.24.1
Patchnames:
SUSE-OpenStack-Cloud-Crowbar-8-2019-818
openSUSE Leap 15.0
  • nodejs8 >= 8.15.1-lp150.2.13.2
  • nodejs8-debuginfo >= 8.15.1-lp150.2.13.2
  • nodejs8-debugsource >= 8.15.1-lp150.2.13.2
  • nodejs8-devel >= 8.15.1-lp150.2.13.2
  • nodejs8-docs >= 8.15.1-lp150.2.13.2
  • npm8 >= 8.15.1-lp150.2.13.2
Patchnames:
openSUSE-2019-1167
openSUSE Leap 42.3
  • nodejs10 >= 10.15.2-5.2
  • nodejs10-debuginfo >= 10.15.2-5.2
  • nodejs10-debugsource >= 10.15.2-5.2
  • nodejs10-devel >= 10.15.2-5.2
  • nodejs10-docs >= 10.15.2-5.2
  • nodejs4 >= 4.9.1-23.1
  • nodejs4-debuginfo >= 4.9.1-23.1
  • nodejs4-debugsource >= 4.9.1-23.1
  • nodejs4-devel >= 4.9.1-23.1
  • nodejs4-docs >= 4.9.1-23.1
  • nodejs6 >= 6.17.0-21.1
  • nodejs6-debuginfo >= 6.17.0-21.1
  • nodejs6-debugsource >= 6.17.0-21.1
  • nodejs6-devel >= 6.17.0-21.1
  • nodejs6-docs >= 6.17.0-21.1
  • npm10 >= 10.15.2-5.2
  • npm4 >= 4.9.1-23.1
  • npm6 >= 6.17.0-21.1
Patchnames:
openSUSE-2019-1076
openSUSE-2019-1173
openSUSE-2019-1211