Описание
Security update for nodejs14
This update for nodejs14 fixes the following issues:
-
New upstream LTS version 14.15.4:
- CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits (bsc#1180553)
- CVE-2020-8287: HTTP Request Smuggling allow two copies of a header field in a http request. For example, two Transfer-Encoding header fields. In this case Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling (https://cwe.mitre.org/data/definitions/444.html). (bsc#1180554)
-
New upstream LTS version 14.15.3:
- deps:
- upgrade npm to 6.14.9
- update acorn to v8.0.4
- http2: check write not scheduled in scope destructor
- stream: fix regression on duplex end
- deps:
-
New upstream LTS version 14.15.1:
- deps: Denial of Service through DNS request (High). A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service by getting the application to resolve a DNS record with a larger number of responses (bsc#1178882, CVE-2020-8277)
Список пакетов
Container bci/node:14
SUSE Linux Enterprise Module for Web and Scripting 15 SP2
Ссылки
- Link for SUSE-SU-2021:0061-1
- E-Mail link for SUSE-SU-2021:0061-1
- SUSE Security Ratings
- SUSE Bug 1178882
- SUSE Bug 1180553
- SUSE Bug 1180554
- SUSE CVE CVE-2020-8265 page
- SUSE CVE CVE-2020-8277 page
- SUSE CVE CVE-2020-8287 page
Описание
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 are vulnerable to a use-after-free bug in its TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits.
Затронутые продукты
Ссылки
- CVE-2020-8265
- SUSE Bug 1180553
Описание
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Затронутые продукты
Ссылки
- CVE-2020-8277
- SUSE Bug 1178882
Описание
Node.js versions before 10.23.1, 12.20.1, 14.15.4, 15.5.1 allow two copies of a header field in an HTTP request (for example, two Transfer-Encoding header fields). In this case, Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling.
Затронутые продукты
Ссылки
- CVE-2020-8287
- SUSE Bug 1180554