rh-nodejs14-nodejs-14.16.0-1.el7
エラータID: AXSA:2021-1590:02
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.16.0).
Security Fix(es):
* nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883)
* nodejs: DNS rebinding in --inspect (CVE-2021-22884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2021-22883
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
CVE-2021-22884
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
Update packages.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to a denial of service attack when too many connection attempts with an 'unknownProtocol' are established. This leads to a leak of file descriptors. If a file descriptor limit is configured on the system, then the server is unable to accept new connections and prevent the process also from opening, e.g. a file. If no file descriptor limit is configured, then this lead to an excessive memory usage and cause the system to run out of memory.
Node.js before 10.24.0, 12.21.0, 14.16.0, and 15.10.0 is vulnerable to DNS rebinding attacks as the whitelist includes “localhost6”. When “localhost6” is not present in /etc/hosts, it is just an ordinary domain that is resolved via DNS, i.e., over network. If the attacker controls the victim's DNS server or can spoof its responses, the DNS rebinding protection can be bypassed by using the “localhost6” domain. As long as the attacker uses the “localhost6” domain, they can still apply the attack described in CVE-2018-7160.
N/A
SRPMS
- rh-nodejs14-nodejs-14.16.0-1.el7.src.rpm
MD5: 5596286df3e71e8e86499c9f6e97099a
SHA-256: 1ae817281baf03487afa8a624acf26de6687bcdbc7a1a321de090b4ad7646478
Size: 42.57 MB
Asianux Server 7 for x86_64
- rh-nodejs14-nodejs-14.16.0-1.el7.x86_64.rpm
MD5: c90ccaa895835750354733101d9a5fcc
SHA-256: 5d64c9edbe674b9b9337a3bdd5bd4d0a24b94b88b3da5a61b92e77d0787c8388
Size: 10.63 MB - rh-nodejs14-nodejs-devel-14.16.0-1.el7.x86_64.rpm
MD5: 43a6dcc836b39fa375cb7398790fe327
SHA-256: e006962f93f0f9a949b4d41593e42ce02519edb98c729e2c3fa27513d4e431f9
Size: 232.48 kB - rh-nodejs14-nodejs-docs-14.16.0-1.el7.noarch.rpm
MD5: b0aa31d3120a8fce1f66c18d55b42d02
SHA-256: 63a2cedc42509ada69fbde75d15c3e2304960976b6df37cfeff759a88e95b092
Size: 4.23 MB - rh-nodejs14-npm-6.14.11-14.16.0.1.el7.x86_64.rpm
MD5: 62d7494f9694ca7c16c48e4510315163
SHA-256: 0a83140627ec396cb8de63707e5684134c88a17b11d2a28a6b2c35ee505ea04a
Size: 4.09 MB