Security update for nodejs16
Announcement ID: | SUSE-SU-2023:0608-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves five vulnerabilities and has one security fix can now be installed.
Description:
This update for nodejs16 fixes the following issues:
Update to LTS version 16.19.1:
- CVE-2023-23918: Fixed permissions policies that could have been bypassed via process.mainModule (bsc#1208481).
- CVE-2023-23919: Fixed OpenSSL error handling issues in nodejs crypto library (bsc#1208483).
- CVE-2023-23920: Fixed insecure loading of ICU data through ICU_DATA environment (bsc#1208487).
- CVE-2023-23936: Fixed protection against CRLF injection in host headers inside fetch API (bsc#1208485).
- CVE-2023-24807: Fixed possible Regular Expression Denial of Service (ReDoS) via Headers.set() and Headers.append() methods (bsc#1208413).
Bug fixes:
- Workaround for failing openssl-nodejs test (bsc#1205568).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
openSUSE Leap 15.4
zypper in -t patch openSUSE-SLE-15.4-2023-608=1
-
Web and Scripting Module 15-SP4
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP4-2023-608=1
Package List:
-
openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64)
- nodejs16-debuginfo-16.19.1-150400.3.15.1
- corepack16-16.19.1-150400.3.15.1
- npm16-16.19.1-150400.3.15.1
- nodejs16-16.19.1-150400.3.15.1
- nodejs16-devel-16.19.1-150400.3.15.1
- nodejs16-debugsource-16.19.1-150400.3.15.1
-
openSUSE Leap 15.4 (noarch)
- nodejs16-docs-16.19.1-150400.3.15.1
-
Web and Scripting Module 15-SP4 (aarch64 ppc64le s390x x86_64)
- nodejs16-debuginfo-16.19.1-150400.3.15.1
- npm16-16.19.1-150400.3.15.1
- nodejs16-16.19.1-150400.3.15.1
- nodejs16-devel-16.19.1-150400.3.15.1
- nodejs16-debugsource-16.19.1-150400.3.15.1
-
Web and Scripting Module 15-SP4 (noarch)
- nodejs16-docs-16.19.1-150400.3.15.1
References:
- https://www.suse.com/security/cve/CVE-2023-23918.html
- https://www.suse.com/security/cve/CVE-2023-23919.html
- https://www.suse.com/security/cve/CVE-2023-23920.html
- https://www.suse.com/security/cve/CVE-2023-23936.html
- https://www.suse.com/security/cve/CVE-2023-24807.html
- https://bugzilla.suse.com/show_bug.cgi?id=1205568
- https://bugzilla.suse.com/show_bug.cgi?id=1208413
- https://bugzilla.suse.com/show_bug.cgi?id=1208481
- https://bugzilla.suse.com/show_bug.cgi?id=1208483
- https://bugzilla.suse.com/show_bug.cgi?id=1208485
- https://bugzilla.suse.com/show_bug.cgi?id=1208487