[SUSE-SU-2023:2662-1] Security update for nodejs18
Severity
Important
CVEs
10
Security update for nodejs18
This update for nodejs18 fixes the following issues:
Update to version 18.16.1:
- CVE-2023-30581: Fixed mainModule.__proto__ Bypass Experimental Policy Mechanism (bsc#1212574).
- CVE-2023-30585: Fixed privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (bsc#1212579).
- CVE-2023-30588: Fixed process interuption due to invalid Public Key information in x509 certificates (bsc#1212581).
- CVE-2023-30589: Fixed HTTP Request Smuggling via empty headers separated by CR (bsc#1212582).
- CVE-2023-30590: Fixed DiffieHellman key generation after setting a private key (bsc#1212583).
- CVE-2023-31124: Fixed cross compilation issue with AutoTools that does not set CARES_RANDOM_FILE (bsc#1211607).
- CVE-2023-31130: Fixed buffer underwrite problem in ares_inet_net_pton() (bsc#1211606).
- CVE-2023-31147: Fixed insufficient randomness in generation of DNS query IDs (bsc#1211605).
- CVE-2023-32067: Fixed denial-of-service via 0-byte UDP payload (bsc#1211604).
- CVE-2022-25881: Fixed a Regular Expression Denial of Service (bsc#1208744).
Bug fixes:
- Increased the default timeout on unit tests from 2 to 20 minutes. This seems to have lead to build failures on some platforms, like s390x in Factory. (bsc#1211407)
- ID
- SUSE-SU-2023:2662-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232662-1/
- Published
-
2023-06-27T18:26:44
(14 months ago) - Modified
-
2023-06-27T18:26:44
(14 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1770
- ALAS2-2023-2127
- ALAS2-2024-2399
- ALAS2-2024-2429
- ALPINE:CVE-2023-30589
- ALSA-2023:1582
- ALSA-2023:1583
- ALSA-2023:1743
- ALSA-2023:2654
- ALSA-2023:2655
- ALSA-2023:3559
- ALSA-2023:3577
- ALSA-2023:3584
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:4330
- ALSA-2023:4331
- ALSA-2023:4536
- ALSA-2023:4537
- ALSA-2023:6635
- ALSA-2023:7207
- DSA-5419-1
- DSA-5589-1
- ELSA-2023-1582
- ELSA-2023-1583
- ELSA-2023-1743
- ELSA-2023-2654
- ELSA-2023-2655
- ELSA-2023-3559
- ELSA-2023-3577
- ELSA-2023-3584
- ELSA-2023-3586
- ELSA-2023-3741
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-4330
- ELSA-2023-4331
- ELSA-2023-4536
- ELSA-2023-4537
- ELSA-2023-6635
- ELSA-2023-7207
- FEDORA-2023-105880e618
- FEDORA-2023-520848815b
- FEDORA-2023-608a1417d3
- FEDORA-2023-61e40652be
- FEDORA-2023-6b866fbe84
- FEDORA-2023-ae97529c00
- FEDORA-2023-cdddce304a
- FEDORA-2023-f75af676f2
- GLSA-202310-09
- GLSA-202405-29
- MAVEN:GHSA-RC47-6667-2J5J
- MS:CVE-2023-31124
- NPM:GHSA-CGGH-PQ45-6H9X
- NPM:GHSA-RC47-6667-2J5J
- RHSA-2023:1582
- RHSA-2023:1583
- RHSA-2023:1743
- RHSA-2023:2654
- RHSA-2023:2655
- RHSA-2023:3559
- RHSA-2023:3577
- RHSA-2023:3584
- RHSA-2023:3586
- RHSA-2023:3741
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:4330
- RHSA-2023:4331
- RHSA-2023:4536
- RHSA-2023:4537
- RHSA-2023:6635
- RHSA-2023:7207
- RLSA-2023:2655
- RLSA-2023:3559
- RLSA-2023:3584
- RLSA-2023:7207
- SSA:2023-142-01
- SUSE-SU-2023:1871-1
- SUSE-SU-2023:1872-1
- SUSE-SU-2023:1875-1
- SUSE-SU-2023:1876-1
- SUSE-SU-2023:1923-1
- SUSE-SU-2023:1924-1
- SUSE-SU-2023:1942-1
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
- SUSE-SU-2023:3306-1
- SUSE-SU-2023:3408-1
- SUSE-SU-2023:3455-1
- USN-6164-1
- USN-6164-2
- USN-6735-1
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |