Security update for nodejs10
Announcement ID: | SUSE-SU-2019:2254-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for nodejs10 to version 10.16.3 fixes the following issues:
Security issues fixed:
- CVE-2019-9511: Fixed HTTP/2 implementations that are vulnerable to window size manipulation and stream prioritization manipulation, potentially leading to a denial of service (bsc#1146091).
- CVE-2019-9512: Fixed HTTP/2 flood using PING frames results in unbounded memory growth (bsc#1146099).
- CVE-2019-9513: Fixed HTTP/2 implementation that is vulnerable to resource loops, potentially leading to a denial of service. (bsc#1146094).
- CVE-2019-9514: Fixed HTTP/2 implementation that is vulnerable to a reset flood, potentially leading to a denial of service (bsc#1146095).
- CVE-2019-9515: Fixed HTTP/2 flood using SETTINGS frames results in unbounded memory growth (bsc#1146100).
- CVE-2019-9516: Fixed HTTP/2 implementation that is vulnerable to a header leak, potentially leading to a denial of service (bsc#1146090).
- CVE-2019-9517: Fixed HTTP/2 implementations that are vulnerable to unconstrained interal data buffering (bsc#1146097).
- CVE-2019-9518: Fixed HTTP/2 implementation that is vulnerable to a flood of empty frames, potentially leading to a denial of service (bsc#1146093).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Web and Scripting Module 12
zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2019-2254=1
Package List:
-
Web and Scripting Module 12 (aarch64 ppc64le s390x x86_64)
- nodejs10-10.16.3-1.12.1
- nodejs10-debuginfo-10.16.3-1.12.1
- nodejs10-debugsource-10.16.3-1.12.1
- nodejs10-devel-10.16.3-1.12.1
- npm10-10.16.3-1.12.1
-
Web and Scripting Module 12 (noarch)
- nodejs10-docs-10.16.3-1.12.1
References:
- https://www.suse.com/security/cve/CVE-2019-9511.html
- https://www.suse.com/security/cve/CVE-2019-9512.html
- https://www.suse.com/security/cve/CVE-2019-9513.html
- https://www.suse.com/security/cve/CVE-2019-9514.html
- https://www.suse.com/security/cve/CVE-2019-9515.html
- https://www.suse.com/security/cve/CVE-2019-9516.html
- https://www.suse.com/security/cve/CVE-2019-9517.html
- https://www.suse.com/security/cve/CVE-2019-9518.html
- https://bugzilla.suse.com/show_bug.cgi?id=1146090
- https://bugzilla.suse.com/show_bug.cgi?id=1146091
- https://bugzilla.suse.com/show_bug.cgi?id=1146093
- https://bugzilla.suse.com/show_bug.cgi?id=1146094
- https://bugzilla.suse.com/show_bug.cgi?id=1146095
- https://bugzilla.suse.com/show_bug.cgi?id=1146097
- https://bugzilla.suse.com/show_bug.cgi?id=1146099
- https://bugzilla.suse.com/show_bug.cgi?id=1146100