[SUSE-SU-2023:0408-1] Security update for nodejs18
Security update for nodejs18
This update for nodejs18 fixes the following issues:
This update ships nodejs18 (jsc#PED-2097)
Update to NodejJS 18.13.0 LTS:
- build: disable v8 snapshot compression by default
- crypto: update root certificates
- deps: update ICU to 72.1
doc:
- add doc-only deprecation for headers/trailers setters
- add Rafael to the tsc
- deprecate use of invalid ports in url.parse
- deprecate url.parse()
lib: drop fetch experimental warning
net: add autoSelectFamily and autoSelectFamilyAttemptTimeout options
src:
- add uvwasi version
- add initial shadow realm support
test_runner:
- add t.after() hook
- don't use a symbol for runHook()
tls:
- add 'ca' property to certificate object
util:
- add fast path for utf8 encoding
- improve textdecoder decode performance
- add MIME utilities
Fixes compatibility with ICU 72.1 (bsc#1205236)
Fix migration to openssl-3 (bsc#1205042)
Update to NodeJS 18.12.1 LTS:
- inspector: DNS rebinding in --inspect via invalid octal IP (bsc#1205119, CVE-2022-43548)
Update to NodeJS 18.12.0 LTS:
- Running in 'watch' mode using node --watch restarts the process when an imported file is changed.
- fs: add FileHandle.prototype.readLines
- http: add writeEarlyHints function to ServerResponse
- http2: make early hints generic
- util: add default value option to parsearg
Update to NodeJS 18.11.0:
- added experimental watch mode -- running in 'watch' mode using node --watch restarts the process when an imported file is changed
- fs: add FileHandle.prototype.readLines
- http: add writeEarlyHints function to ServerResponse
- http2: make early hints generic
- lib: refactor transferable AbortSignal
- src: add detailed embedder process initialization API
- util: add default value option to parsearg
Update to NodeJS 18.10.0:
- deps: upgrade npm to 8.19.2
- http: throw error on content-length mismatch
- stream: add ReadableByteStream.tee()
Update to Nodejs 18.9.1:
deps: llhttp updated to 6.0.10
- CVE-2022-32213 bypass via obs-fold mechanic (bsc#1201325)
- Incorrect Parsing of Multi-line Transfer-Encoding (CVE-2022-32215, bsc#1201327)
- Incorrect Parsing of Header Fields (CVE-2022-35256, bsc#1203832)
crypto: fix weak randomness in WebCrypto keygen
(CVE-2022-35255, bsc#1203831)
Update to Nodejs 18.9.0:
- lib - add diagnostics channel for process and worker
- os - add machine method
- report - expose report public native apis
- src - expose environment RequestInterrupt api
- vm - include vm context in the embedded snapshot
Changes in 18.8.0:
- bootstrap: implement run-time user-land snapshots via --build-snapshot and --snapshot-blob. See
- crypto:
- allow zero-length IKM in HKDF and in webcrypto PBKDF2
- allow zero-length secret KeyObject
- deps: upgrade npm to 8.18.0
- http: make idle http parser count configurable
- net: add local family
- src: print source map error source on demand
- tls: pass a valid socket on tlsClientError
Update to Nodejs 18.7.0:
- events: add CustomEvent
- http: add drop request event for http server
- lib: improved diagnostics_channel subscribe/unsubscribe
util: add tokens to parseArgs
enable crypto policy ciphers for TW and SLE15 SP4+ (bsc#1200303)
Update to Nodejs 18.6.0:
- Experimental ESM Loader Hooks API. For details see, https://nodejs.org/api/esm.html
- dns: export error code constants from dns/promises
- esm: add chaining to loaders
- http: add diagnostics channel for http client
- http: add perf_hooks detail for http request and client
- module: add isBuiltIn method
- net: add drop event for net server
- test_runner: expose describe and it
- v8: add v8.startupSnapshot utils
For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.6.0
Update to Nodejs 18.5.0:
- http: stricter Transfer-Encoding and header separator parsing (bsc#1201325, bsc#1201326, bsc#1201327, CVE-2022-32213, CVE-2022-32214, CVE-2022-32215)
- src: fix IPv4 validation in inspector_socket (bsc#1201328, CVE-2022-32212)
For details, see
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.5.0
Update to Nodejs 18.4.0. For detailed changes see,
https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V18.md#18.4.0
- refreshed: versioned.patch, linker_lto_jobs.patch, nodejs-libpath.patch
Initial packaging of Nodejs 18.2.0. For detailed changes since previous versions, see
https://github.com/nodejs/node/blob/master/doc/changelogs/CHANGELOG_V18.md#18.2.0
- ID
- SUSE-SU-2023:0408-1
- Severity
- moderate
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20230408-1/
- Published
-
2023-02-14T12:50:31
(19 months ago) - Modified
-
2023-02-14T12:50:31
(19 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALPINE:CVE-2022-32212
- ALPINE:CVE-2022-32213
- ALPINE:CVE-2022-32214
- ALPINE:CVE-2022-32215
- ALPINE:CVE-2022-35255
- ALPINE:CVE-2022-35256
- ALPINE:CVE-2022-43548
- ALSA-2022:6448
- ALSA-2022:6595
- ALSA-2022:6963
- ALSA-2022:6964
- ALSA-2022:7821
- ALSA-2022:7830
- ALSA-2022:8832
- ALSA-2022:8833
- ALSA-2022:9073
- ALSA-2023:0050
- ALSA-2023:0321
- DSA-5326-1
- ELSA-2022-6448
- ELSA-2022-6449
- ELSA-2022-6595
- ELSA-2022-6963
- ELSA-2022-6964
- ELSA-2022-7821
- ELSA-2022-7830
- ELSA-2022-8832
- ELSA-2022-8833
- ELSA-2023-0050
- ELSA-2023-0321
- FEDORA-2022-1667f7b60a
- FEDORA-2022-52dec6351a
- FEDORA-2022-de515f765f
- FREEBSD:B9210706-FEB0-11EC-81FA-1C697A616631
- GLSA-202405-29
- MS:CVE-2022-32212
- MS:CVE-2022-32213
- MS:CVE-2022-32214
- MS:CVE-2022-32215
- MS:CVE-2022-35256
- MS:CVE-2022-43548
- NPM:GHSA-5689-V88G-G6RV
- NPM:GHSA-Q5VX-44V4-GCH4
- RHSA-2022:6448
- RHSA-2022:6449
- RHSA-2022:6595
- RHSA-2022:6963
- RHSA-2022:6964
- RHSA-2022:7821
- RHSA-2022:7830
- RHSA-2022:8832
- RHSA-2022:8833
- RHSA-2022:9073
- RHSA-2023:0050
- RHSA-2023:0321
- RLSA-2022:6448
- RLSA-2022:6449
- RLSA-2022:6964
- RLSA-2022:7821
- RLSA-2022:7830
- RLSA-2022:8833
- RLSA-2022:9073
- RLSA-2023:0050
- RLSA-2023:0321
- SUSE-SU-2022:2415-1
- SUSE-SU-2022:2416-1
- SUSE-SU-2022:2417-1
- SUSE-SU-2022:2425-1
- SUSE-SU-2022:2430-1
- SUSE-SU-2022:2491-1
- SUSE-SU-2022:2551-1
- SUSE-SU-2022:2855-1
- SUSE-SU-2022:3503-1
- SUSE-SU-2022:3516-1
- SUSE-SU-2022:3524-1
- SUSE-SU-2022:3614-1
- SUSE-SU-2022:3615-1
- SUSE-SU-2022:3616-1
- SUSE-SU-2022:3656-1
- SUSE-SU-2022:3835-1
- SUSE-SU-2022:3967-1
- SUSE-SU-2022:3968-1
- SUSE-SU-2022:3989-1
- SUSE-SU-2022:4003-1
- SUSE-SU-2022:4084-1
- SUSE-SU-2022:4254-1
- SUSE-SU-2022:4255-1
- SUSE-SU-2022:4301-1
- SUSE-SU-2023:0419-1
- USN-6491-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |