-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0819
                        http-parser security update
                               5 March 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           http-parser
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 8
Impact/Access:     Access Confidential Data -- Remote/Unauthenticated
                   Unauthorised Access      -- Remote/Unauthenticated
                   Reduced Security         -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-15605  

Reference:         ESB-2020.0815
                   ESB-2020.0695
                   ESB-2020.0690
                   ESB-2020.0662

Original Bulletin: 
   https://access.redhat.com/errata/RHSA-2020:0707
   https://access.redhat.com/errata/RHSA-2020:0708

Comment: This bulletin contains two (2) Red Hat security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: http-parser security update
Advisory ID:       RHSA-2020:0707-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0707
Issue date:        2020-03-04
CVE Names:         CVE-2019-15605 
=====================================================================

1. Summary:

An update for http-parser is now available for Red Hat Enterprise Linux 8.0
Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream E4S (v. 8.0) - aarch64, ppc64le, s390x, x86_64

3. Description:

The http-parser package provides a utility for parsing HTTP messages. It
parses both requests and responses. The parser is designed to be used in
performance HTTP applications. It does not make any system calls or
allocations, it does not buffer data, and it can be interrupted at any
time. Depending on your architecture, it only requires about 40 bytes of
data per message stream.

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header
(CVE-2019-15605)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1800364 - CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header

6. Package List:

Red Hat Enterprise Linux AppStream E4S (v. 8.0):

Source:
http-parser-2.8.0-2.el8_0.2.src.rpm

aarch64:
http-parser-2.8.0-2.el8_0.2.aarch64.rpm
http-parser-debuginfo-2.8.0-2.el8_0.2.aarch64.rpm
http-parser-debugsource-2.8.0-2.el8_0.2.aarch64.rpm

ppc64le:
http-parser-2.8.0-2.el8_0.2.ppc64le.rpm
http-parser-debuginfo-2.8.0-2.el8_0.2.ppc64le.rpm
http-parser-debugsource-2.8.0-2.el8_0.2.ppc64le.rpm

s390x:
http-parser-2.8.0-2.el8_0.2.s390x.rpm
http-parser-debuginfo-2.8.0-2.el8_0.2.s390x.rpm
http-parser-debugsource-2.8.0-2.el8_0.2.s390x.rpm

x86_64:
http-parser-2.8.0-2.el8_0.2.i686.rpm
http-parser-2.8.0-2.el8_0.2.x86_64.rpm
http-parser-debuginfo-2.8.0-2.el8_0.2.i686.rpm
http-parser-debuginfo-2.8.0-2.el8_0.2.x86_64.rpm
http-parser-debugsource-2.8.0-2.el8_0.2.i686.rpm
http-parser-debugsource-2.8.0-2.el8_0.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-15605
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=J/P6
- -----END PGP SIGNATURE-----


- ---------------------------------------------------------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: http-parser security update
Advisory ID:       RHSA-2020:0708-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:0708
Issue date:        2020-03-04
CVE Names:         CVE-2019-15605 
=====================================================================

1. Summary:

An update for http-parser is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

The http-parser package provides a utility for parsing HTTP messages. It
parses both requests and responses. The parser is designed to be used in
performance HTTP applications. It does not make any system calls or
allocations, it does not buffer data, and it can be interrupted at any
time. Depending on your architecture, it only requires about 40 bytes of
data per message stream.

Security Fix(es):

* nodejs: HTTP request smuggling using malformed Transfer-Encoding header
(CVE-2019-15605)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1800364 - CVE-2019-15605 nodejs: HTTP request smuggling using malformed Transfer-Encoding header

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

Source:
http-parser-2.8.0-5.el8_1.2.src.rpm

aarch64:
http-parser-2.8.0-5.el8_1.2.aarch64.rpm
http-parser-debuginfo-2.8.0-5.el8_1.2.aarch64.rpm
http-parser-debugsource-2.8.0-5.el8_1.2.aarch64.rpm

ppc64le:
http-parser-2.8.0-5.el8_1.2.ppc64le.rpm
http-parser-debuginfo-2.8.0-5.el8_1.2.ppc64le.rpm
http-parser-debugsource-2.8.0-5.el8_1.2.ppc64le.rpm

s390x:
http-parser-2.8.0-5.el8_1.2.s390x.rpm
http-parser-debuginfo-2.8.0-5.el8_1.2.s390x.rpm
http-parser-debugsource-2.8.0-5.el8_1.2.s390x.rpm

x86_64:
http-parser-2.8.0-5.el8_1.2.i686.rpm
http-parser-2.8.0-5.el8_1.2.x86_64.rpm
http-parser-debuginfo-2.8.0-5.el8_1.2.i686.rpm
http-parser-debuginfo-2.8.0-5.el8_1.2.x86_64.rpm
http-parser-debugsource-2.8.0-5.el8_1.2.i686.rpm
http-parser-debugsource-2.8.0-5.el8_1.2.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2019-15605
https://access.redhat.com/security/updates/classification/#important

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+3+z
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=DNxg
-----END PGP SIGNATURE-----