Описание
ELSA-2025-7502: nodejs22 security update (MODERATE)
[1:22.16.0-1]
- Update to version 22.16.0
[1:22.15.0-3]
- Make grep Source stricter in nodejs-tarball
[1:22.15.0-2]
- Add unit-test during build for nodejs22
[1:22.15.0-1]
- Update to version 22.15.0
[1:22.13.1-6]
- Update c-ares with fix for CVE-2025-31498
[1:22.13.1-5]
- Revert 'Generate only versioned rpms'
[1:22.13.1-4]
- Use stream-specific ABI dependency generator
[1:22.13.1-3]
- Generate only versioned rpms
Обновленные пакеты
Oracle Linux 10
Oracle Linux aarch64
nodejs
22.16.0-1.el10_0
nodejs-devel
22.16.0-1.el10_0
nodejs-docs
22.16.0-1.el10_0
nodejs-full-i18n
22.16.0-1.el10_0
nodejs-libs
22.16.0-1.el10_0
nodejs-npm
10.9.2-1.22.16.0.1.el10_0
Oracle Linux x86_64
nodejs
22.16.0-1.el10_0
nodejs-devel
22.16.0-1.el10_0
nodejs-docs
22.16.0-1.el10_0
nodejs-full-i18n
22.16.0-1.el10_0
nodejs-libs
22.16.0-1.el10_0
nodejs-npm
10.9.2-1.22.16.0.1.el10_0
Связанные CVE
Связанные уязвимости
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4, there is a use-after-free in read_answers() when process_answer() may re-enqueue a query either due to a DNS Cookie Failure or when the upstream server does not properly support EDNS, or possibly on TCP queries if the remote closed the connection immediately after a response. If there was an issue trying to put that new transaction on the wire, it would close the connection handle, but read_answers() was still expecting the connection handle to be available to possibly dequeue other responses. In theory a remote attacker might be able to trigger this by flooding the target with ICMP UNREACHABLE packets if they also control the upstream nameserver and can return a result with one of those conditions, this has been untested. Otherwise only a local attacker might be able to change system behavior to make send()/write() return a failure condition. This vulnerability is fixed in 1.34.5.
c-ares is an asynchronous resolver library. From 1.32.3 through 1.34.4 ...