You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa nodejs

Sigurnosni nedostaci programskog paketa nodejs

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2019-5a6a7bc12c
2019-08-25 00:56:58.831335
——————————————————————————–

Name : nodejs
Product : Fedora 30
Version : 10.16.3
Release : 1.fc30
URL : http://nodejs.org/
Summary : JavaScript runtime
Description :
Node.js is a platform built on Chrome’s JavaScript runtime
for easily building fast, scalable network applications.
Node.js uses an event-driven, non-blocking I/O model that
makes it lightweight and efficient, perfect for data-intensive
real-time applications that run across distributed devices.

——————————————————————————–
Update Information:

Update to Node.js 10.6.13
——————————————————————————–
ChangeLog:

* Fri Aug 16 2019 Stephen Gallagher <sgallagh@redhat.com> – 1:10.16.3-1
– Update to 10.16.3 security release
– Resolves: CVE-2019-9511 “Data Dribble”
– Resolves: CVE-2019-9512 “Ping Flood”
– Resolves: CVE-2019-9513 “Resource Loop”
– Resolves: CVE-2019-9514 “Reset Flood”
– Resolves: CVE-2019-9515 “Settings Flood”
– Resolves: CVE-2019-9516 “0-Length Headers Leak”
– Resolves: CVE-2019-9517 “Internal Data Buffering”
– Resolves: CVE-2019-9518 “Empty Frames Flood”
– https://github.com/nodejs/node/blob/v10.16.3/doc/changelogs/CHANGELOG_V10.md
* Mon Jun 3 2019 Stephen Gallagher <sgallagh@redhat.com> – 1:10.16.0-3
– Change v8-devel release stream to avoid duplicate NEVRAs
* Fri May 31 2019 Stephen Gallagher <sgallagh@redhat.com> – 1:10.16.0-1
– Update to 10.16.0
– https://nodejs.org/en/blog/release/v10.16.0/
* Wed Apr 24 2019 Stephen Gallagher <sgallagh@redhat.com> – 1:10.15.3-2
– Fix upgrade bug for v8-devel (BZ #1702609)
——————————————————————————–
References:

[ 1 ] Bug #1741979 – CVE-2019-9516 nodejs: HTTP/2: 0-length headers leads to denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741979
[ 2 ] Bug #1741974 – CVE-2019-9517 nodejs: HTTP/2: request for large response leads to denial of service [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741974
[ 3 ] Bug #1741969 – CVE-2019-9518 nodejs: HTTP/2: flood using empty frames results in excessive resources consumption [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741969
[ 4 ] Bug #1741968 – CVE-2019-9515 nodejs: http/2: HTTP/2 flood using SETTINGS frames results in unbounded memory growth [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741968
[ 5 ] Bug #1741967 – CVE-2019-9513 nodejs: HTTP/2: flood using PRIORITY frames resulting in excessive resource consumption [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741967
[ 6 ] Bug #1741964 – CVE-2019-9514 nodejs: http/2: HTTP/2 flood using HEADERS frames results in unbounded memory growth [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741964
[ 7 ] Bug #1741962 – CVE-2019-9512 nodejs: http/2: HTTP/2 flood using PING frames results in unbounded memory growth [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1741962
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-5a6a7bc12c’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

AutorJosip Papratovic
Cert idNCERT-REF-2019-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa qbittorrent

Otkriven je sigurnosni nedostatak u programskom paketu qbittorrent za operacijski sustav openSUSE. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnog programskog...

Close