rh-nodejs12-nodejs-12.21.0-1.el7
エラータID: AXSA:2021-1589:01
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs12-nodejs (12.21.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-22883
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CVE-2021-22884
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Update packages.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
N/A
SRPMS
- rh-nodejs12-nodejs-12.21.0-1.el7.src.rpm
MD5: 1db36b7089411bb5191ebd2aa6958295
SHA-256: 3cfccbac6e5520e894d253d1636ea901238146ff3b30e94bdf1704b5d2bd2dd9
Size: 33.05 MB
Asianux Server 7 for x86_64
- rh-nodejs12-nodejs-12.21.0-1.el7.x86_64.rpm
MD5: 3537f781e90a06d0fe268e5a25426ca6
SHA-256: 48480a2b677391788325eb93c9831f5e7fcaa89af4632996a2a77090dd359e21
Size: 10.17 MB - rh-nodejs12-nodejs-devel-12.21.0-1.el7.x86_64.rpm
MD5: 28cb6fe3934f276f79b0948bd3cb5bc1
SHA-256: ea920edafb35015f70c3f7f1b61a2f671b1934a8e282ba7381ced4a78892b8e5
Size: 206.50 kB - rh-nodejs12-nodejs-docs-12.21.0-1.el7.noarch.rpm
MD5: 8d0fa9fe66aab326d7afca27a84bda9f
SHA-256: d6bf55b697c404639bdaf14665ae1e01fdd74cae2eb2086aaa85d1a151eefb7a
Size: 4.11 MB - rh-nodejs12-npm-6.14.11-12.21.0.1.el7.x86_64.rpm
MD5: 57c7a1a0fae29491e00a47a41ca123ad
SHA-256: f11b42f7c8da1e88591cf8de0d4e0467fc27cb1366f0bfd2856f8b4223284a20
Size: 4.00 MB