Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2018:1918-1

Опубликовано: 09 июл. 2018
Источник: suse-cvrf

Описание

Security update for nodejs8

This update for nodejs8 to version 8.11.3 fixes the following issues:

These security issues were fixed:

  • CVE-2018-7167: Calling Buffer.fill() or Buffer.alloc() with some parameters could have lead to a hang which could have resulted in a DoS (bsc#1097375).
  • CVE-2018-7161: By interacting with the http2 server in a manner that triggered a cleanup bug where objects are used in native code after they are no longer available an attacker could have caused a denial of service (DoS) by causing a node server providing an http2 server to crash (bsc#1097404).
  • CVE-2018-1000168: Fixed a denial of service vulnerability by unbundling nghttp2 (bsc#1097401)

Список пакетов

SUSE Linux Enterprise Module for Web and Scripting 15
nodejs8-8.11.3-3.5.1
nodejs8-devel-8.11.3-3.5.1
nodejs8-docs-8.11.3-3.5.1
npm8-8.11.3-3.5.1

Описание

nghttp2 version >= 1.10.0 and nghttp2 <= v1.31.0 contains an Improper Input Validation CWE-20 vulnerability in ALTSVC frame handling that can result in segmentation fault leading to denial of service. This attack appears to be exploitable via network client. This vulnerability appears to have been fixed in >= 1.31.1.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.11.3-3.5.1

Ссылки

Описание

All versions of Node.js 8.x, 9.x, and 10.x are vulnerable and the severity is HIGH. An attacker can cause a denial of service (DoS) by causing a node server providing an http2 server to crash. This can be accomplished by interacting with the http2 server in a manner that triggers a cleanup bug where objects are used in native code after they are no longer available. This has been addressed by updating the http2 implementation.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.11.3-3.5.1

Ссылки

Описание

Calling Buffer.fill() or Buffer.alloc() with some parameters can lead to a hang which could result in a Denial of Service. In order to address this vulnerability, the implementations of Buffer.alloc() and Buffer.fill() were updated so that they zero fill instead of hanging in these cases. All versions of Node.js 6.x (LTS "Boron"), 8.x (LTS "Carbon"), and 9.x are vulnerable. All versions of Node.js 10.x (Current) are NOT vulnerable.


Затронутые продукты
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-devel-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:nodejs8-docs-8.11.3-3.5.1
SUSE Linux Enterprise Module for Web and Scripting 15:npm8-8.11.3-3.5.1

Ссылки