summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2026-01-02 12:28:59 +0100
committerGyorgy Sarvari <skandigraun@gmail.com>2026-01-08 22:03:03 +0100
commit8e69851e6d745a8a51630428f8d72df6b42b5040 (patch)
tree6d41b00f8de623e573325c8194703fa44a34b4aa
parentab83c61385854a2d333ed25c238c736bb596ce96 (diff)
downloadmeta-openembedded-8e69851e6d745a8a51630428f8d72df6b42b5040.tar.gz
nodejs: patch CVE-2024-27983
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-27983 Pick the patch that mentions this CVE ID explcitly in its commit message. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
-rw-r--r--meta-oe/recipes-devtools/nodejs/nodejs/CVE-2024-27983.patch40
-rw-r--r--meta-oe/recipes-devtools/nodejs/nodejs_16.20.2.bb1
2 files changed, 41 insertions, 0 deletions
diff --git a/meta-oe/recipes-devtools/nodejs/nodejs/CVE-2024-27983.patch b/meta-oe/recipes-devtools/nodejs/nodejs/CVE-2024-27983.patch
new file mode 100644
index 0000000000..895a92052f
--- /dev/null
+++ b/meta-oe/recipes-devtools/nodejs/nodejs/CVE-2024-27983.patch
@@ -0,0 +1,40 @@
1From a8e022586ffe06a27709f4d8c03f328e3042a77d Mon Sep 17 00:00:00 2001
2From: Gyorgy Sarvari <skandigraun@gmail.com>
3Date: Tue, 26 Mar 2024 15:55:13 -0300
4Subject: [PATCH] src: ensure to close stream when destroying session
5
6From: RafaelGSS <rafael.nunu@hotmail.com>
7
8Co-Authored-By: Anna Henningsen <anna@addaleax.net>
9PR-URL: https://github.com/nodejs-private/node-private/pull/561
10Fixes: https://hackerone.com/reports/2319584
11Reviewed-By: Michael Dawson <midawson@redhat.com>
12Reviewed-By: Marco Ippolito <marcoippolito54@gmail.com>
13Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
14Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
15CVE-ID: CVE-2024-27983
16
17CVE: CVE-2024-27983
18Upstream-Status: Backport [https://github.com/nodejs/node/commit/0fb816dbccde955cd24acc1b16497a91fab507c8]
19Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
20---
21 src/node_http2.cc | 6 ++++++
22 1 file changed, 6 insertions(+)
23
24diff --git a/src/node_http2.cc b/src/node_http2.cc
25index 53216dc..9a6d63d 100644
26--- a/src/node_http2.cc
27+++ b/src/node_http2.cc
28@@ -529,6 +529,12 @@ Http2Session::Http2Session(Http2State* http2_state,
29 Http2Session::~Http2Session() {
30 CHECK(!is_in_scope());
31 Debug(this, "freeing nghttp2 session");
32+ // Ensure that all `Http2Stream` instances and the memory they hold
33+ // on to are destroyed before the nghttp2 session is.
34+ for (const auto& [id, stream] : streams_) {
35+ stream->Detach();
36+ }
37+ streams_.clear();
38 // Explicitly reset session_ so the subsequent
39 // current_nghttp2_memory_ check passes.
40 session_.reset();
diff --git a/meta-oe/recipes-devtools/nodejs/nodejs_16.20.2.bb b/meta-oe/recipes-devtools/nodejs/nodejs_16.20.2.bb
index 9c279d1463..9326b26421 100644
--- a/meta-oe/recipes-devtools/nodejs/nodejs_16.20.2.bb
+++ b/meta-oe/recipes-devtools/nodejs/nodejs_16.20.2.bb
@@ -31,6 +31,7 @@ SRC_URI = "http://nodejs.org/dist/v${PV}/node-v${PV}.tar.xz \
31 file://CVE-2024-22025.patch \ 31 file://CVE-2024-22025.patch \
32 file://CVE-2023-46809.patch \ 32 file://CVE-2023-46809.patch \
33 file://CVE-2023-39333.patch \ 33 file://CVE-2023-39333.patch \
34 file://CVE-2024-27983.patch \
34 " 35 "
35SRC_URI:append:class-target = " \ 36SRC_URI:append:class-target = " \
36 file://0001-Using-native-binaries.patch \ 37 file://0001-Using-native-binaries.patch \