Bug 1661005 (CVE-2018-12122)
Summary: | CVE-2018-12122 nodejs: Slowloris HTTP Denial of Service | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Laura Pardo <lpardo> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | avibelli, bgeorges, chazlett, dbeveniu, hesilva, hhorak, jbalunas, jorton, jpallich, krathod, lthon, mszynkie, pgallagh, rruss, trogers, zsvetlik |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs 6.15.1, nodejs 8.14.0, nodejs 10.14.0, nodejs 11.3.0 | Doc Type: | If docs needed, set a value |
Doc Text: |
It was found that Node.js HTTP server was vulnerable to a Slowloris type attack. An attacker could make long lived connections by sending bytes very slowly to the server, saturating its resource and possibly resulting in a denial of service.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-07-22 15:07:00 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1661006, 1661007, 1668704, 1668705, 1668706, 1720059, 1720060, 1720061, 1720062 | ||
Bug Blocks: | 1661014 |
Description
Laura Pardo
2018-12-19 19:49:11 UTC
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 1661007] Affects: fedora-all [bug 1661006] Quick correction on nodejs 6 : the commit 5d9005c35 is also required. The fixed version is actually 6.15.1 Upstream fixes: master: * https://github.com/nodejs/node/commit/ee618a7ab239c98d945c723a4e225bc409151736 Node.js 10: * https://github.com/nodejs/node/commit/eb43bc04b1390ce2506144b46d081e63f7a7d5b7 Node.js 8 : * https://github.com/nodejs/node/commit/696f063c5e9157fd10859515da00fd8bd190d76d Node.js 6 : * https://github.com/nodejs/node/commit/618eebdd175b598a06bbc4d3d1efeb85e3fa1429 * https://github.com/nodejs/node/commit/5d9005c35963c3fefc93b607dff75c1471e819d7 Statement: The nodejs RPMs shipped in Red Hat OpenShift Container Platform (OCP) versions 3.6 through 3.10 are vulnerable to this flaw because they contain the affected code. Later versions of OCP used nodejs RPMs delivered from Red Hat Software Collections and Red Hat Enterprise Linux channels. Mitigation: The use of a Load Balancer or a Reverse Proxy will increase the difficulty of the attack. This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Via RHSA-2019:1821 https://access.redhat.com/errata/RHSA-2019:1821 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-12122 In rh-nodejs10-nodejs, this was fixed via the rebase from RHSA-2019:2939 : https://access.redhat.com/errata/RHSA-2019:2939 |