Описание
Security update for nodejs8
This update for nodejs8 to version 8.11.4 fixes the following issues:
Security issues fixed:
- CVE-2018-12115: Fixed an out-of-bounds memory write in Buffer that could be used to write to memory outside of a Buffer's memory space buffer (bsc#1105019)
- Upgrade to OpenSSL 1.0.2p, which fixed:
- CVE-2018-0732: Client denial-of-service due to large DH parameter (bsc#1097158)
- ECDSA key extraction via local side-channel
Other changes made:
- Recommend same major version npm package (bsc#1097748)
- Fix parallel/test-tls-passphrase.js test to continue to function with older versions of OpenSSL library.
This update was imported from the SUSE:SLE-15:Update update project.
Список пакетов
openSUSE Leap 15.0
Ссылки
- E-Mail link for openSUSE-SU-2018:2855-1
- SUSE Security Ratings
Описание
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Затронутые продукты
Ссылки
- CVE-2018-0732
- SUSE Bug 1077628
- SUSE Bug 1097158
- SUSE Bug 1099502
- SUSE Bug 1101651
- SUSE Bug 1101653
- SUSE Bug 1106692
- SUSE Bug 1108542
- SUSE Bug 1112097
- SUSE Bug 1112147
- SUSE Bug 1112151
- SUSE Bug 1122198
- SUSE Bug 1122292
Описание
In all versions of Node.js prior to 6.14.4, 8.11.4 and 10.9.0 when used with UCS-2 encoding (recognized by Node.js under the names `'ucs2'`, `'ucs-2'`, `'utf16le'` and `'utf-16le'`), `Buffer#write()` can be abused to write outside of the bounds of a single `Buffer`. Writes that start from the second-to-last position of a buffer cause a miscalculation of the maximum length of the input bytes to be written.
Затронутые продукты
Ссылки
- CVE-2018-12115
- SUSE Bug 1105019