Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-7502

Опубликовано: 30 июн. 2025
Источник: oracle-oval
Платформа: Oracle Linux 10

Описание

ELSA-2025-7502: nodejs22 security update (MODERATE)

[1:22.16.0-1]

  • Update to version 22.16.0

[1:22.15.0-3]

  • Make grep Source stricter in nodejs-tarball

[1:22.15.0-2]

  • Add unit-test during build for nodejs22

[1:22.15.0-1]

  • Update to version 22.15.0

[1:22.13.1-6]

  • Update c-ares with fix for CVE-2025-31498

[1:22.13.1-5]

  • Revert 'Generate only versioned rpms'

[1:22.13.1-4]

  • Use stream-specific ABI dependency generator

[1:22.13.1-3]

  • Generate only versioned rpms

Обновленные пакеты

Oracle Linux 10

Oracle Linux aarch64

nodejs

22.16.0-1.el10_0

nodejs-devel

22.16.0-1.el10_0

nodejs-docs

22.16.0-1.el10_0

nodejs-full-i18n

22.16.0-1.el10_0

nodejs-libs

22.16.0-1.el10_0

nodejs-npm

10.9.2-1.22.16.0.1.el10_0

Oracle Linux x86_64

nodejs

22.16.0-1.el10_0

nodejs-devel

22.16.0-1.el10_0

nodejs-docs

22.16.0-1.el10_0

nodejs-full-i18n

22.16.0-1.el10_0

nodejs-libs

22.16.0-1.el10_0

nodejs-npm

10.9.2-1.22.16.0.1.el10_0

Связанные CVE

Связанные уязвимости

ubuntu
4 месяца назад

c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.

CVSS3: 7
redhat
4 месяца назад

c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.

nvd
4 месяца назад

c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.

msrc
4 месяца назад

Описание отсутствует

debian
4 месяца назад

c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4 ...