Skip to navigation

Security Advisory Moderate: nodejs010-nodejs security update

Advisory: RHSA-2013:1842-1
Type: Security Advisory
Severity: Moderate
Issued on: 2013-12-16
Last updated on: 2013-12-16
Affected Products: Red Hat Software Collections 1 for RHEL 6
CVEs (cve.mitre.org): CVE-2013-4450

Details

Updated nodejs010-nodejs packages that fix one security issue are now
available for Red Hat Software Collections 1.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.

A denial of service flaw was found in the way Node.js handled pipelined
HTTP requests. A remote attacker could use this flaw to send an excessive
amount of HTTP requests over a network connection, causing Node.js to use
an excessive amount of memory and possibly exit when all available memory
is exhausted. (CVE-2013-4450)

Node.js is included in Red Hat Software Collections 1.0 as a Technology
Preview. More information about Red Hat Technology Previews is available
here: https://access.redhat.com/support/offerings/techpreview/

All nodejs010-nodejs users are advised to upgrade to these updated
packages, which contain a backported patch to correct this issue.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Software Collections 1 for RHEL 6

SRPMS:
nodejs010-nodejs-0.10.5-8.el6.src.rpm     MD5: 1970cbb4a52919407db7bfdab4b3af24
SHA-256: ee328c0a8f6863fb4513ade781af5238b94141f477577ac58d9fed0c207735fa
 
x86_64:
nodejs010-nodejs-0.10.5-8.el6.x86_64.rpm     MD5: 25761b34865c485dc7cd611c84b71209
SHA-256: 4e502f3facd0acd70fa51a361d74663e59b37217509a9cc879f3f4f1c0d81cc8
nodejs010-nodejs-debuginfo-0.10.5-8.el6.x86_64.rpm     MD5: 158371c8a9cfe4937442fc5be2d2690a
SHA-256: a0edc04c3fe429e6c7eee7645186eb705a164df6dbd86de592ce04a4499258bd
nodejs010-nodejs-devel-0.10.5-8.el6.x86_64.rpm     MD5: a0165d210bd68e8678d36bc3cef42358
SHA-256: 1d013861cb8504d0154e4d7da86d6f019557ae8c9e42282328ce49dea12c4453
nodejs010-nodejs-docs-0.10.5-8.el6.x86_64.rpm     MD5: cdb398f3a397f8d3db7b9d6ab1a80d8b
SHA-256: b1ccee379c7797969823c72ffa9c6a5160e65742a8716bc83dda3f8804639e13
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1021170 - CVE-2013-4450 NodeJS: HTTP Pipelining DoS


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/