Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2020-5807

Опубликовано: 10 авг. 2020
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2020-5807: GraalVM Security update (IMPORTANT)

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

graalvm20-ee-8

20.1.1-1.el7uln

graalvm20-ee-8-devel

20.1.1-1.el7uln

graalvm20-ee-8-javascript

20.1.1-1.el7uln

graalvm20-ee-8-jdk

20.1.1-1.el7uln

graalvm20-ee-8-jre

20.1.1-1.el7uln

graalvm20-ee-8-jre-headless

20.1.1-1.el7uln

graalvm20-ee-8-libpolyglot

20.1.1-1.el7uln

graalvm20-ee-8-llvm

20.1.1-1.el7uln

graalvm20-ee-8-llvm-toolchain

20.1.1-1.el7uln

graalvm20-ee-8-native-image

20.1.1-1.el7uln

graalvm20-ee-8-nodejs

20.1.1-1.el7uln

graalvm20-ee-8-nodejs-devel

20.1.1-1.el7uln

graalvm20-ee-8-polyglot

20.1.1-1.el7uln

graalvm20-ee-8-python

20.1.1-1.el7uln

graalvm20-ee-8-python-devel

20.1.1-1.el7uln

graalvm20-ee-8-ruby

20.1.1-1.el7uln

graalvm20-ee-8-ruby-devel

20.1.1-1.el7uln

graalvm20-ee-8-wasm

20.1.1-1.el7uln

graalvm20-ee-11

20.1.1-1.el7uln

graalvm20-ee-11-devel

20.1.1-1.el7uln

graalvm20-ee-11-javascript

20.1.1-1.el7uln

graalvm20-ee-11-jdk

20.1.1-1.el7uln

graalvm20-ee-11-libpolyglot

20.1.1-1.el7uln

graalvm20-ee-11-llvm

20.1.1-1.el7uln

graalvm20-ee-11-llvm-toolchain

20.1.1-1.el7uln

graalvm20-ee-11-native-image

20.1.1-1.el7uln

graalvm20-ee-11-nodejs

20.1.1-1.el7uln

graalvm20-ee-11-nodejs-devel

20.1.1-1.el7uln

graalvm20-ee-11-polyglot

20.1.1-1.el7uln

graalvm20-ee-11-python

20.1.1-1.el7uln

graalvm20-ee-11-python-devel

20.1.1-1.el7uln

graalvm20-ee-11-ruby

20.1.1-1.el7uln

graalvm20-ee-11-ruby-devel

20.1.1-1.el7uln

graalvm20-ee-11-wasm

20.1.1-1.el7uln

Связанные уязвимости

oracle-oval
почти 5 лет назад

ELSA-2020-5806: GraalVM Security update (IMPORTANT)

suse-cvrf
около 5 лет назад

Security update for nodejs12

rocky
почти 5 лет назад

Important: nodejs:12 security update

oracle-oval
почти 5 лет назад

ELSA-2020-2852: nodejs:12 security update (IMPORTANT)

CVSS3: 3.7
ubuntu
около 5 лет назад

In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.