Bug 1201710 (CVE-2022-31150) - VUL-0: CVE-2022-31150,CVE-2022-31150: nodejs16: CRLF injection in node-undici
Summary: VUL-0: CVE-2022-31150,CVE-2022-31150: nodejs16: CRLF injection in node-undici
Status: RESOLVED FIXED
Alias: CVE-2022-31150
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/337774/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-31150:5.3:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2022-07-20 12:31 UTC by Gabriele Sonnu
Modified: 2024-04-19 11:32 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Gabriele Sonnu 2022-07-20 12:31:20 UTC
CVE-2022-31150

undici is an HTTP/1.1 client, written from scratch for Node.js. It is possible
to inject CRLF sequences into request headers in undici in versions less than
5.7.1. A fix was released in version 5.8.0. Sanitizing all HTTP headers from
untrusted sources to eliminate `\r\n` is a workaround for this issue.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-31150
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31150
https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc
https://github.com/nodejs/undici/releases/tag/v5.8.0
https://hackerone.com/reports/409943
Comment 1 Gabriele Sonnu 2022-07-20 12:36:28 UTC
Affected packages:

- SUSE:SLE-12-SP5:Update/nodejs16   node-undici (5.0.0)   
- openSUSE:Factory/nodejs16         node-undici (5.0.0)

Also affected, update that embeds node-undici is currently in the QA phase:

- SUSE:SLE-15-SP3:Update/nodejs16   node-undici (5.0.0)
- SUSE:SLE-15-SP4:Update/nodejs16   node-undici (5.0.0)
Comment 7 OBSbugzilla Bot 2022-08-25 16:40:04 UTC
This is an autogenerated message for OBS integration:
This bug (1201710) was mentioned in
https://build.opensuse.org/request/show/999257 Factory / nodejs16
Comment 8 Swamp Workflow Management 2022-09-08 13:59:31 UTC
SUSE-SU-2022:3196-1: An update that solves four vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1200303,1200517,1201710,1202382,1202383
CVE References: CVE-2022-29244,CVE-2022-31150,CVE-2022-35948,CVE-2022-35949
JIRA References: 
Sources used:
SUSE Linux Enterprise Module for Web Scripting 12 (src):    nodejs16-16.17.0-8.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Swamp Workflow Management 2022-09-12 10:26:53 UTC
SUSE-SU-2022:3250-1: An update that solves four vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1200303,1200517,1201710,1202382,1202383
CVE References: CVE-2022-29244,CVE-2022-31150,CVE-2022-35948,CVE-2022-35949
JIRA References: 
Sources used:
openSUSE Leap 15.4 (src):    nodejs16-16.17.0-150400.3.6.1
SUSE Linux Enterprise Module for Web Scripting 15-SP4 (src):    nodejs16-16.17.0-150400.3.6.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2022-09-12 10:33:30 UTC
SUSE-SU-2022:3251-1: An update that solves four vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1200303,1200517,1201710,1202382,1202383
CVE References: CVE-2022-29244,CVE-2022-31150,CVE-2022-35948,CVE-2022-35949
JIRA References: 
Sources used:
openSUSE Leap 15.3 (src):    nodejs16-16.17.0-150300.7.9.1
SUSE Linux Enterprise Module for Web Scripting 15-SP3 (src):    nodejs16-16.17.0-150300.7.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Robert Frohl 2024-04-19 11:32:00 UTC
done