Debian LTS: DLA-3246-1: node-hawk security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3246-1                [email protected]
https://www.debian.org/lts/security/                           Chris Lamb
December 23, 2022                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : node-hawk
Version        : 6.0.1+dfsg-1+deb10u1
CVE IDs        : CVE-2022-29167

It was discovered that there was an issue in Hawk, an HTTP
authentication scheme. Hawk used a regular expression to parse `Host`
HTTP headers which was subject to regular expression DoS attack. Each
added character in the attacker's input increased the computation
time exponentially.

For Debian 10 buster, this problem has been fixed in version
6.0.1+dfsg-1+deb10u1.

We recommend that you upgrade your node-hawk packages.

For the detailed security status of node-hawk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-hawk

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Debian LTS: DLA-3246-1: node-hawk security update

December 23, 2022
It was discovered that there was an issue in Hawk, an HTTP authentication scheme

Summary

For Debian 10 buster, this problem has been fixed in version
6.0.1+dfsg-1+deb10u1.

We recommend that you upgrade your node-hawk packages.

For the detailed security status of node-hawk please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-hawk

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Severity
Package : node-hawk
Version : 6.0.1+dfsg-1+deb10u1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.