rh-nodejs10-nodejs-10.24.0-1.el7
エラータID: AXSA:2021-1588:02
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs10-nodejs (10.24.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-22883
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CVE-2021-22884
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Update packages.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
N/A
SRPMS
- rh-nodejs10-nodejs-10.24.0-1.el7.src.rpm
MD5: 5b11d35e3c75baa8cf32c2f66efa498e
SHA-256: 598c51ec068b6a8665d72565a4b1cbff60a0285400ce7cc7f105074459fa6c87
Size: 27.96 MB
Asianux Server 7 for x86_64
- rh-nodejs10-nodejs-10.24.0-1.el7.x86_64.rpm
MD5: 8b6746a1eb4885fa3349070f819e322d
SHA-256: 4209ee08443a7f90c4b3b95abfb5971a873a44baa4f5a19f945cf5419ec7cbd5
Size: 8.60 MB - rh-nodejs10-nodejs-devel-10.24.0-1.el7.x86_64.rpm
MD5: d14f3a9f3fc7764fb1c6508b21b8b897
SHA-256: 33be82d1c0b1c53ea8ba1c729ceb5ae9fd6615b7701ed06fa3b6571461507334
Size: 193.97 kB - rh-nodejs10-nodejs-docs-10.24.0-1.el7.noarch.rpm
MD5: 84c1414ad39d5384a3b060721ad8c9e8
SHA-256: 948281b1ef2dfe47e6a1cbfc0399841b62a78690a1e112cfce19bbea30499027
Size: 3.37 MB - rh-nodejs10-npm-6.14.11-10.24.0.1.el7.x86_64.rpm
MD5: aaa274729cadfc0d6043044a622d8aa9
SHA-256: 2d0f3ebaac6b88fe0da94c3b433082026e213374923eb7ae2e54f578cc2a028c
Size: 4.00 MB