rh-nodejs12-nodejs-12.19.1-2.el7
エラータID: AXSA:2020-959:05
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.19.1).
Security Fix(es):
* nodejs-y18n: prototype pollution vulnerability (CVE-2020-7774)
* c-ares: ares_parse_{a,aaaa}_reply() insufficient naddrttls validation DoS (CVE-2020-8277)
* nodejs-ajv: prototype pollution via crafted JSON schema in ajv.validate function (CVE-2020-15366)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2020-15366
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
CVE-2020-7774
This affects the package y18n before 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
CVE-2020-8277
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Update packages.
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service, not execution of code.)
This affects the package y18n before 5.0.5. PoC by po6ix: const y18n = require('y18n')(); y18n.setLocale('__proto__'); y18n.updateLocale({polluted: true}); console.log(polluted); // true
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
N/A
SRPMS
- rh-nodejs12-nodejs-12.19.1-2.el7.src.rpm
MD5: a9be91f179d44323851cb5e73fde539c
SHA-256: 98c72476b0a450564efd6bd2af471a07a298ff421ab9433f9db76990c2caa142
Size: 33.21 MB
Asianux Server 7 for x86_64
- rh-nodejs12-nodejs-12.19.1-2.el7.x86_64.rpm
MD5: a11e491ee594d551b5c7e5a58359416f
SHA-256: 7416203bce6ccc7fe1dcddd49accec72bcfa9d4470a3b1ab30681c098a1be2ff
Size: 10.15 MB - rh-nodejs12-nodejs-devel-12.19.1-2.el7.x86_64.rpm
MD5: c522504022397f0646ab996bbb500eb9
SHA-256: c51569287f01b150eb0efb7376bcf6e25ced7cdcbf6ced2187473129cd5190cb
Size: 206.03 kB - rh-nodejs12-nodejs-docs-12.19.1-2.el7.noarch.rpm
MD5: f92e00357c2e2a8a7f64addc663a0d72
SHA-256: 4d609b492bd6174598cca2418563ef184f52eb4d913e8146a83c2b563eb65889
Size: 4.14 MB - rh-nodejs12-npm-6.14.8-12.19.1.2.el7.x86_64.rpm
MD5: 7198b0dc48851dd6aa238d75d9bfdf34
SHA-256: 2770dced0acb130a2c83b28d753a4e5c57764ba58c02679f1c69c02e7ae24bf0
Size: 4.16 MB