Ubuntu alert USN-7469-3 (nodejs)
| From: | John Breton <john.breton@canonical.com> | |
| To: | ubuntu-security-announce@lists.ubuntu.com | |
| Subject: | [USN-7469-3] Node.js vulnerability | |
| Date: | Tue, 29 Apr 2025 12:26:07 -0400 | |
| Message-ID: | <59fb1b38-467e-467d-b71c-720824ca8e28@canonical.com> |
========================================================================== Ubuntu Security Notice USN-7469-3 April 29, 2025 nodejs vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Node.js could be made to crash if it received specially crafted network traffic. Software Description: - nodejs: An open-source, cross-platform JavaScript runtime environment. Details: USN-7469-1 fixed a vulnerability in Apache Traffic Server. This update provides the corresponding updates for Node.js. Original advisory details: It was discovered that Apache Traffic Server exhibited poor server resource management in its HTTP/2 protocol. An attacker could possibly use this issue to cause Apache Traffic Server to crash, resulting in a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.04 LTS libnode-dev 12.22.9~dfsg-1ubuntu3.6+esm2 Available with Ubuntu Pro libnode72 12.22.9~dfsg-1ubuntu3.6+esm2 Available with Ubuntu Pro nodejs 12.22.9~dfsg-1ubuntu3.6+esm2 Available with Ubuntu Pro Ubuntu 20.04 LTS libnode-dev 10.19.0~dfsg-3ubuntu1.6+esm2 Available with Ubuntu Pro libnode64 10.19.0~dfsg-3ubuntu1.6+esm2 Available with Ubuntu Pro nodejs 10.19.0~dfsg-3ubuntu1.6+esm2 Available with Ubuntu Pro Ubuntu 18.04 LTS nodejs 8.10.0~dfsg-2ubuntu0.4+esm6 Available with Ubuntu Pro nodejs-dev 8.10.0~dfsg-2ubuntu0.4+esm6 Available with Ubuntu Pro After a standard system update you need to restart Node.js to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-7469-3 https://ubuntu.com/security/notices/USN-7469-2 https://ubuntu.com/security/notices/USN-7469-1 CVE-2023-44487
Attachment: OpenPGP_signature.asc (type=application/pgp-signature)
-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEyMDHOTG0YH5UsajI8pSCVQZYHygFAmgQ/Z8FAwAAAAAACgkQ8pSCVQZYHyhi ABAAkcX7vtFuNnGuPITnlIL6/5IdKIUyk/pnGE0lEVWjL3H+DOmGmzISN5549eBBCQjZoXn8OF+/ Px6mnqI091C1xlM2EOXDweNtcU15V7P2XJ8ajZpMbas9LFsFhNVyNrMyuur9cHBCsuXa0c+MOQms 0E4lb6iLcqzvfGUgQhEeUWy+dd1aiOLj/JmWMSUIg8sY09J4ygEInnrVvtqMftr2ZPzuxSP9K+uM aAI6ruR1NxAU7Lc0nHTEUOB5QgjGFGDupEEFe6RZVVueBEO5jvaocaSCnlgLCjkGcN+JyAZHcS24 6ifWyGtIK4X+dRTTO+jsixccVWRvmtPauLN4RykL/Iv4HPUvax/FXrhWPTrOZGK/u8VNpBKLVeii IibW9Pv6qbxlhlqHLbotPWTM4psZQtd/Dfn372X330ImBAmUetIVQKFtWYip5Y3UclZQYCAPYGQV NlIJ2Dm6LV9uocrWtWa1htK6Xi5lMCz5Lv09Nh2TpLdLjx2jTYGoCZ/Kj/C6QY+VjZDYfmwS5CTp 0u5Q/+hrE0Igzh2CauxtFOvtWw5RXAj826Rj5OxLQcUlONcGQvNx+MVJvuI0sd6xJ5kOX/VVKvZA 6RjL4XCoefL8wH/6vEIwCgf3CR/tmhlW+Msyy0x4dwM7UWBY0dbaT3z541R+VMxaYeQxn55puXEo S70= =MwOX -----END PGP SIGNATURE-----
Attachment: None (type=text/plain)
