rh-nodejs8-nodejs-8.11.4-1.el7

エラータID: AXSA:2019-3540:01

Release date: 
Friday, February 15, 2019 - 12:26
Subject: 
rh-nodejs8-nodejs-8.11.4-1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: rh-nodejs8-nodejs (8.11.4). (BZ#1621761)

Security Fix(es):

* nodejs: Out of bounds (OOB) write via UCS-2 encoding (CVE-2018-12115)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2018-7159
The HTTP parser in all current versions of Node.js ignores spaces in the `Content-Length` header, allowing input such as `Content-Length: 1 2` to be interpreted as having a value of `12`. The HTTP specification does not allow for spaces in the `Content-Length` value and the Node.js HTTP parser has been brought into line on this particular difference. The security risk of this flaw to Node.js users is considered to be VERY LOW as it is difficult, and may be impossible, to craft an attack that makes use of this flaw in a way that could not already be achieved by supplying an incorrect value for `Content-Length`. Vulnerabilities may exist in user-code that make incorrect assumptions about the potential accuracy of this value compared to the actual length of the data supplied. Node.js users crafting lower-level HTTP utilities are advised to re-check the length of any input supplied after parsing is complete.
CVE-2018-7160
The Node.js inspector, in 6.x and later is vulnerable to a DNS rebinding attack which could be exploited to perform remote code execution. An attack is possible from malicious websites open in a web browser on the same computer, or another computer with network access to the computer running the Node.js process. A malicious website could use a DNS rebinding attack to trick the web browser to bypass same-origin-policy checks and to allow HTTP connections to localhost or to hosts on the local network. If a Node.js process with the debug port active is running on localhost or on a host on the local network, the malicious website could connect to it as a debugger, and get full code execution access.
CVE-2018-7161
All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.
CVE-2018-7167
Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.
CVE-2018-12115
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. rh-nodejs8-nodejs-8.11.4-1.el7.src.rpm
    MD5: fd039d13d6035d93d70d25288be44cf3
    SHA-256: 9956f9a928ecf68f1ef9d5484172f15040a7452adc7b609f086ebb4cc0494abe
    Size: 23.85 MB

Asianux Server 7 for x86_64
  1. rh-nodejs8-nodejs-8.11.4-1.el7.x86_64.rpm
    MD5: 72cca9d9cfbb0818ab8ab9799f8cdb4b
    SHA-256: 30cd05edd3f33a1bc57d185e49941eb554ecb308723c49a56169d0f6158825f6
    Size: 7.13 MB
  2. rh-nodejs8-nodejs-devel-8.11.4-1.el7.x86_64.rpm
    MD5: 7e74dd0d693d2ef8f3575e7247bee085
    SHA-256: 18b5fb3e1aef72d50350ef600e41f23dd00fb6153f1aa9b2d249b8b4f444a71a
    Size: 8.72 MB
  3. rh-nodejs8-nodejs-docs-8.11.4-1.el7.noarch.rpm
    MD5: 2099c4a30a28e2fda416d2a199a64e86
    SHA-256: e6b7d8df7bcd2169e1c0becb65fb2766c3d0443e943c8f9e1d640e36b72bf01a
    Size: 2.42 MB
  4. rh-nodejs8-npm-5.6.0-8.11.4.1.el7.x86_64.rpm
    MD5: 04ce1ad0b1f247f3f0a45989d309f96a
    SHA-256: b4f4cfb646b05b68aab3bcc389a9fb4b3b8b218cb04550b48fcd1bc1eac210bd
    Size: 4.39 MB