Headline
CVE-2020-8277: November 2020 Security Releases | Node.js
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
Updates are now available for v12.x, v14.x and v15.x Node.js release lines for the following issues.
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of service by getting the application to resolve a DNS record with a larger number of responses.
Impacts:
- Versions 12.16.3 and higher on the 12.x release line
- Versions 14.13.0 and higher on the 14.x release line
- All versions of the 15.x release line
Downloads and release details
- Node.js v12.19.1 (LTS)
- Node.js v14.15.1 (LTS)
- Node.js v15.2.1 (Current)
The Node.js project will release new versions of 15.x, 14.x and 12.x on or shortly after Monday, November 16th, 2020. These releases will fix:
- One high severity issue
The 15.x release line of Node.js is vulnerable to one high severity issue. The 14.x release line of Node.js is vulnerable to one high severity issue. The 12.x release line of Node.js is vulnerable to one high severity issue.
Releases will be available at, or shortly after, Monday, November 16th, 2020
The current Node.js security policy can be found at https://nodejs.org/en/security/. Please follow the process outlined in https://github.com/nodejs/node/blob/master/SECURITY.md if you wish to report a vulnerability in Node.js.
Subscribe to the low-volume announcement-only nodejs-sec mailing list at https://groups.google.com/forum/#!forum/nodejs-sec to stay up to date on security vulnerabilities and security-related releases of Node.js and the projects maintained in the nodejs GitHub organization.