Denial of Service through DNS request (High). A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service by getting the application to resolve a DNS record with a larger number of responses. Reference: https://github.com/c-ares/c-ares/issues/371 Upstream patch: https://github.com/c-ares/c-ares/commit/0d252eb3b2147179296a3bdb4ef97883c97c54d3
Created c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898556] Created mingw-c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898557] Created nodejs:11/c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898558] Created nodejs:12/c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898559] Created nodejs:13/c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898561] Created nodejs:14/c-ares tracking bugs for this issue: Affects: fedora-all [bug 1898562]
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5305 https://access.redhat.com/errata/RHSA-2020:5305
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8277
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:5499 https://access.redhat.com/errata/RHSA-2020:5499
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2021:0421 https://access.redhat.com/errata/RHSA-2021:0421
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0551 https://access.redhat.com/errata/RHSA-2021:0551