[SUSE-SU-2023:2861-1] Security update for nodejs16
Severity
Important
Affected Packages
13
CVEs
9
Security update for nodejs16
This update for nodejs16 fixes the following issues:
Update to version 16.20.1:
- CVE-2023-30581: Fixed mainModule.__proto__ Bypass Experimental Policy Mechanism (bsc#1212574).
- CVE-2023-30585: Fixed privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (bsc#1212579).
- CVE-2023-30588: Fixed process interuption due to invalid Public Key information in x509 certificates (bsc#1212581).
- CVE-2023-30589: Fixed HTTP Request Smuggling via empty headers separated by CR (bsc#1212582).
- CVE-2023-30590: Fixed DiffieHellman key generation after setting a private key (bsc#1212583).
- CVE-2023-31124: Fixed cross compilation issue with AutoTools that does not set CARES_RANDOM_FILE (bsc#1211607).
- CVE-2023-31130: Fixed buffer underwrite problem in ares_inet_net_pton() (bsc#1211606).
- CVE-2023-31147: Fixed insufficient randomness in generation of DNS query IDs (bsc#1211605).
- CVE-2023-32067: Fixed denial-of-service via 0-byte UDP payload (bsc#1211604).
Bug fixes:
- Increased the default timeout on unit tests from 2 to 20 minutes. This seems to have lead to build failures on some platforms, like s390x in Factory. (bsc#1211407)
- ID
- SUSE-SU-2023:2861-1
- Severity
- important
- URL
- https://www.suse.com/support/update/announcement/2023/suse-su-20232861-1/
- Published
-
2023-07-17T14:46:32
(14 months ago) - Modified
-
2023-07-17T14:46:32
(14 months ago) - Rights
- Copyright 2024 SUSE LLC. All rights reserved.
- Other Advisories
-
- ALAS-2023-1770
- ALAS2-2023-2127
- ALAS2-2024-2399
- ALAS2-2024-2429
- ALPINE:CVE-2023-30589
- ALSA-2023:3559
- ALSA-2023:3577
- ALSA-2023:3584
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:4330
- ALSA-2023:4331
- ALSA-2023:4536
- ALSA-2023:4537
- ALSA-2023:6635
- ALSA-2023:7207
- DSA-5419-1
- DSA-5589-1
- ELSA-2023-3559
- ELSA-2023-3577
- ELSA-2023-3584
- ELSA-2023-3586
- ELSA-2023-3741
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-4330
- ELSA-2023-4331
- ELSA-2023-4536
- ELSA-2023-4537
- ELSA-2023-6635
- ELSA-2023-7207
- FEDORA-2023-105880e618
- FEDORA-2023-520848815b
- FEDORA-2023-608a1417d3
- FEDORA-2023-61e40652be
- FEDORA-2023-6b866fbe84
- FEDORA-2023-ae97529c00
- FEDORA-2023-cdddce304a
- FEDORA-2023-f75af676f2
- GLSA-202310-09
- GLSA-202405-29
- MS:CVE-2023-31124
- NPM:GHSA-CGGH-PQ45-6H9X
- RHSA-2023:3559
- RHSA-2023:3577
- RHSA-2023:3584
- RHSA-2023:3586
- RHSA-2023:3741
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:4330
- RHSA-2023:4331
- RHSA-2023:4536
- RHSA-2023:4537
- RHSA-2023:6635
- RHSA-2023:7207
- RLSA-2023:3559
- RLSA-2023:3584
- RLSA-2023:7207
- SSA:2023-142-01
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:3306-1
- SUSE-SU-2023:3408-1
- SUSE-SU-2023:3455-1
- USN-6164-1
- USN-6164-2
- USN-6735-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/suse/npm16?arch=x86_64&distro=sles-15&sp=3 | suse | npm16 | < 16.20.1-150300.7.24.2 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/npm16?arch=s390x&distro=sles-15&sp=3 | suse | npm16 | < 16.20.1-150300.7.24.2 | sles-15 | s390x | |
Affected | pkg:rpm/suse/npm16?arch=ppc64le&distro=sles-15&sp=3 | suse | npm16 | < 16.20.1-150300.7.24.2 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/npm16?arch=aarch64&distro=sles-15&sp=3 | suse | npm16 | < 16.20.1-150300.7.24.2 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/nodejs16?arch=x86_64&distro=sles-15&sp=3 | suse | nodejs16 | < 16.20.1-150300.7.24.2 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/nodejs16?arch=s390x&distro=sles-15&sp=3 | suse | nodejs16 | < 16.20.1-150300.7.24.2 | sles-15 | s390x | |
Affected | pkg:rpm/suse/nodejs16?arch=ppc64le&distro=sles-15&sp=3 | suse | nodejs16 | < 16.20.1-150300.7.24.2 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/nodejs16?arch=aarch64&distro=sles-15&sp=3 | suse | nodejs16 | < 16.20.1-150300.7.24.2 | sles-15 | aarch64 | |
Affected | pkg:rpm/suse/nodejs16-docs?arch=noarch&distro=sles-15&sp=3 | suse | nodejs16-docs | < 16.20.1-150300.7.24.2 | sles-15 | noarch | |
Affected | pkg:rpm/suse/nodejs16-devel?arch=x86_64&distro=sles-15&sp=3 | suse | nodejs16-devel | < 16.20.1-150300.7.24.2 | sles-15 | x86_64 | |
Affected | pkg:rpm/suse/nodejs16-devel?arch=s390x&distro=sles-15&sp=3 | suse | nodejs16-devel | < 16.20.1-150300.7.24.2 | sles-15 | s390x | |
Affected | pkg:rpm/suse/nodejs16-devel?arch=ppc64le&distro=sles-15&sp=3 | suse | nodejs16-devel | < 16.20.1-150300.7.24.2 | sles-15 | ppc64le | |
Affected | pkg:rpm/suse/nodejs16-devel?arch=aarch64&distro=sles-15&sp=3 | suse | nodejs16-devel | < 16.20.1-150300.7.24.2 | sles-15 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |