Описание
Security update for nodejs4, nodejs6
This update for nodejs4 and nodejs6 fixes the following issues:
Security issues fixed:
- CVE-2017-1000381: The c-ares function ares_parse_naptr_reply() could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way. (bsc#1044946)
- CVE-2017-11499: Disable V8 snapshots. The hashseed embedded in the snapshot is currently the same for all runs of the binary. This opens node up to collision attacks which could result in a Denial of Service. We have temporarily disabled snapshots until a more robust solution is found. (bsc#1048299)
Non-security fixes:
-
GCC 7 compilation fixes for v8 backported and add missing ICU59 headers (bsc#1041282)
-
New upstream LTS release 6.11.1
-
New upstream LTS release 6.11.0
-
New upstream LTS release 6.10.3
-
New upstream LTS release 6.10.2
-
New upstream LTS release 6.10.1
-
New upstream LTS release 6.10.0
-
New upstream LTS release 4.8.4
-
New upstream LTS release 4.8.3
-
New upstream LTS release 4.8.2
-
New upstream LTS release 4.8.1
-
New upstream LTS release 4.8.0
Список пакетов
SUSE Enterprise Storage 4
SUSE Linux Enterprise Module for Web and Scripting 12
SUSE OpenStack Cloud 7
Ссылки
- Link for SUSE-SU-2017:2168-1
- E-Mail link for SUSE-SU-2017:2168-1
- SUSE Security Ratings
- SUSE Bug 1041282
- SUSE Bug 1041283
- SUSE Bug 1044946
- SUSE Bug 1048299
- SUSE CVE CVE-2017-1000381 page
- SUSE CVE CVE-2017-11499 page
Описание
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Затронутые продукты
Ссылки
- CVE-2017-1000381
- SUSE Bug 1044946
Описание
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Затронутые продукты
Ссылки
- CVE-2017-11499
- SUSE Bug 1044849
- SUSE Bug 1048299
- SUSE Bug 1051117