Bug 1140290 (CVE-2019-13173)

Summary: VUL-0: CVE-2019-13173: nodejs4,nodejs6,nodejs8,nodejs10,nodejs: nodejs-fstream: File overwrite in fstream.DirWriter() function
Product: [Novell Products] SUSE Security Incidents Reporter: Alexandros Toptsoglou <atoptsoglou>
Component: IncidentsAssignee: Security Team bot <security-team>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Major    
Priority: P3 - Medium CC: amajer, jmassaguerpla, smash_bz
Version: unspecified   
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/236108/
Whiteboard: CVSSv2:NVD:CVE-2019-13173:6.4:(AV:N/AC:L/Au:N/C:N/I:P/A:P) CVSSv3:NVD:CVE-2019-13173:7.5:(AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) CVSSv3:RedHat:CVE-2019-13173:7.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) CVSSv3:SUSE:CVE-2019-13173:7.3:(AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Found By: Security Response Team Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Alexandros Toptsoglou 2019-07-03 16:52:39 UTC
CVE-2019-13173

Affected versions of this package are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file.

Upstream patch:

https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22

References:

https://www.npmjs.com/advisories/886

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1710570
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13173
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173
https://www.npmjs.com/advisories/886
https://github.com/npm/fstream/commit/6a77d2fa6e1462693cf8e46f930da96ec1b0bb22
Comment 1 Alexandros Toptsoglou 2019-07-03 16:53:21 UTC
All nodejs are affected in all codestreams
Comment 3 Adam Majer 2019-07-30 08:32:32 UTC
Fixes submitted. Reassigning to security-team.
Comment 5 Swamp Workflow Management 2019-08-01 15:50:10 UTC
This is an autogenerated message for OBS integration:
This bug (1140290) was mentioned in
https://build.opensuse.org/request/show/720251 Factory / nodejs10
Comment 6 Swamp Workflow Management 2019-08-06 16:11:21 UTC
SUSE-SU-2019:2055-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1134209,1140290
CVE References: CVE-2019-13173
Sources used:
SUSE Linux Enterprise Module for Web Scripting 15-SP1 (src):    nodejs8-8.15.1-3.17.1
SUSE Linux Enterprise Module for Web Scripting 15 (src):    nodejs8-8.15.1-3.17.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Swamp Workflow Management 2019-08-07 13:10:45 UTC
SUSE-SU-2019:2078-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1140290
CVE References: CVE-2019-13173
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs4-4.9.1-15.23.1
SUSE Enterprise Storage 4 (src):    nodejs4-4.9.1-15.23.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Swamp Workflow Management 2019-08-07 16:10:40 UTC
SUSE-SU-2019:2081-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1134208,1140290
CVE References: CVE-2019-13173
Sources used:
SUSE Linux Enterprise Module for Web Scripting 15-SP1 (src):    nodejs10-10.16.0-1.9.1
SUSE Linux Enterprise Module for Web Scripting 15 (src):    nodejs10-10.16.0-1.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2019-08-09 13:13:44 UTC
SUSE-SU-2019:2099-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1134208,1140290
CVE References: CVE-2019-13173
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs10-10.16.0-1.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2019-08-12 22:11:48 UTC
openSUSE-SU-2019:1846-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1134208,1140290
CVE References: CVE-2019-13173
Sources used:
openSUSE Leap 15.1 (src):    nodejs10-10.16.0-lp151.2.3.1
Comment 11 Swamp Workflow Management 2019-08-15 13:29:26 UTC
openSUSE-SU-2019:1907-1: An update that solves one vulnerability and has one errata is now available.

Category: security (important)
Bug References: 1134209,1140290
CVE References: CVE-2019-13173
Sources used:
openSUSE Leap 15.1 (src):    nodejs8-8.15.1-lp151.2.3.1
openSUSE Leap 15.0 (src):    nodejs8-8.15.1-lp150.2.16.1
Comment 12 Swamp Workflow Management 2019-08-19 19:12:11 UTC
SUSE-SU-2019:2181-1: An update that fixes one vulnerability is now available.

Category: security (important)
Bug References: 1140290
CVE References: CVE-2019-13173
Sources used:
SUSE OpenStack Cloud Crowbar 9 (src):    nodejs6-6.17.0-11.27.1
SUSE OpenStack Cloud Crowbar 8 (src):    nodejs6-6.17.0-11.27.1
SUSE OpenStack Cloud 7 (src):    nodejs6-6.17.0-11.27.1
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs6-6.17.0-11.27.1
SUSE Enterprise Storage 4 (src):    nodejs6-6.17.0-11.27.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 16 Swamp Workflow Management 2019-12-11 20:28:12 UTC
SUSE-SU-2019:14246-1: An update that fixes 118 vulnerabilities is now available.

Category: security (important)
Bug References: 1000036,1001652,1025108,1029377,1029902,1040164,104105,1042670,1043008,1044946,1047925,1047936,1048299,1049186,1050653,1056058,1058013,1066242,1066953,1070738,1070853,1072320,1072322,1073796,1073798,1073799,1073803,1073808,1073818,1073823,1073829,1073830,1073832,1073846,1074235,1077230,1079761,1081750,1082318,1087453,1087459,1087463,1088573,1091764,1094814,1097158,1097375,1097401,1097404,1097748,1104841,1105019,1107030,1109465,1117473,1117626,1117627,1117629,1117630,1120644,1122191,1123482,1124525,1127532,1129346,1130694,1130840,1133452,1133810,1134209,1138459,1140290,1140868,1141853,1144919,1145665,1146090,1146091,1146093,1146094,1146095,1146097,1146099,1146100,1149323,1153423,1154738,1447070,1447409,744625,744629,845955,865853,905528,917607,935856,937414,947747,948045,948602,955142,957814,957815,961254,962297,966076,966077,985201,986541,991344,998743
CVE References: CVE-2013-2882,CVE-2013-6639,CVE-2013-6640,CVE-2013-6668,CVE-2014-0224,CVE-2015-3193,CVE-2015-3194,CVE-2015-5380,CVE-2015-7384,CVE-2016-2086,CVE-2016-2178,CVE-2016-2183,CVE-2016-2216,CVE-2016-5172,CVE-2016-5325,CVE-2016-6304,CVE-2016-6306,CVE-2016-7052,CVE-2016-7099,CVE-2017-1000381,CVE-2017-10686,CVE-2017-11111,CVE-2017-11499,CVE-2017-14228,CVE-2017-14849,CVE-2017-14919,CVE-2017-15896,CVE-2017-15897,CVE-2017-17810,CVE-2017-17811,CVE-2017-17812,CVE-2017-17813,CVE-2017-17814,CVE-2017-17815,CVE-2017-17816,CVE-2017-17817,CVE-2017-17818,CVE-2017-17819,CVE-2017-17820,CVE-2017-18207,CVE-2017-3735,CVE-2017-3736,CVE-2017-3738,CVE-2018-0732,CVE-2018-1000168,CVE-2018-12115,CVE-2018-12116,CVE-2018-12121,CVE-2018-12122,CVE-2018-12123,CVE-2018-20406,CVE-2018-20852,CVE-2018-7158,CVE-2018-7159,CVE-2018-7160,CVE-2018-7161,CVE-2018-7167,CVE-2019-10160,CVE-2019-11709,CVE-2019-11710,CVE-2019-11711,CVE-2019-11712,CVE-2019-11713,CVE-2019-11714,CVE-2019-11715,CVE-2019-11716,CVE-2019-11717,CVE-2019-11718,CVE-2019-11719,CVE-2019-11720,CVE-2019-11721,CVE-2019-11723,CVE-2019-11724,CVE-2019-11725,CVE-2019-11727,CVE-2019-11728,CVE-2019-11729,CVE-2019-11730,CVE-2019-11733,CVE-2019-11735,CVE-2019-11736,CVE-2019-11738,CVE-2019-11740,CVE-2019-11742,CVE-2019-11743,CVE-2019-11744,CVE-2019-11746,CVE-2019-11747,CVE-2019-11748,CVE-2019-11749,CVE-2019-11750,CVE-2019-11751,CVE-2019-11752,CVE-2019-11753,CVE-2019-11757,CVE-2019-11758,CVE-2019-11759,CVE-2019-11760,CVE-2019-11761,CVE-2019-11762,CVE-2019-11763,CVE-2019-11764,CVE-2019-13173,CVE-2019-15903,CVE-2019-5010,CVE-2019-5737,CVE-2019-9511,CVE-2019-9512,CVE-2019-9513,CVE-2019-9514,CVE-2019-9515,CVE-2019-9516,CVE-2019-9517,CVE-2019-9518,CVE-2019-9636,CVE-2019-9811,CVE-2019-9812,CVE-2019-9947
Sources used:
SUSE Linux Enterprise Server 11-SP4-LTSS (src):    MozillaFirefox-68.2.0-78.51.4, MozillaFirefox-branding-SLED-68-21.9.8, firefox-atk-2.26.1-2.8.4, firefox-cairo-1.15.10-2.13.4, firefox-gcc5-5.3.1+r233831-14.1, firefox-gcc8-8.2.1+r264010-2.5.1, firefox-gdk-pixbuf-2.36.11-2.8.4, firefox-glib2-2.54.3-2.14.7, firefox-gtk3-3.10.9-2.15.3, firefox-harfbuzz-1.7.5-2.7.4, firefox-libffi-3.2.1.git259-2.3.3, firefox-libffi-gcc5-5.3.1+r233831-14.1, firefox-pango-1.40.14-2.7.4, mozilla-nspr-4.21-29.6.1, mozilla-nss-3.45-38.9.3

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 17 Swamp Workflow Management 2020-01-09 17:11:23 UTC
SUSE-SU-2020:0059-1: An update that solves 9 vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1140290,1146090,1146091,1146093,1146094,1146095,1146097,1146099,1146100,1149792
CVE References: CVE-2019-13173,CVE-2019-9511,CVE-2019-9512,CVE-2019-9513,CVE-2019-9514,CVE-2019-9515,CVE-2019-9516,CVE-2019-9517,CVE-2019-9518
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs12-12.13.0-1.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 18 Marcus Meissner 2020-04-17 15:51:18 UTC
released