[USN-6457-1] Node.js vulnerabilities
Several security issues were fixed in Node.js.
Tavis Ormandy discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2022-0778)
Elison Niven discovered that Node.js incorrectly handled certain inputs. If a
user or an automated system were tricked into opening a specially crafted
input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-1292)
Chancen and Daniel Fiala discovered that Node.js incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-2068)
Alex Chernyakhovsky discovered that Node.js incorrectly handled certain
inputs. If a user or an automated system were tricked into opening a specially
crafted input file, a remote attacker could possibly use this issue to execute
arbitrary code. (CVE-2022-2097)
Package | Affected Version |
---|---|
pkg:deb/ubuntu/nodejs?distro=jammy | < 12.22.9~dfsg-1ubuntu3.1 |
pkg:deb/ubuntu/nodejs-doc?distro=jammy | < 12.22.9~dfsg-1ubuntu3.1 |
pkg:deb/ubuntu/libnode72?distro=jammy | < 12.22.9~dfsg-1ubuntu3.1 |
pkg:deb/ubuntu/libnode-dev?distro=jammy | < 12.22.9~dfsg-1ubuntu3.1 |
- ID
- USN-6457-1
- Severity
- critical
- Severity from
- CVE-2022-1292
- URL
- https://ubuntu.com/security/notices/USN-6457-1
- Published
-
2023-10-30T10:06:58
(10 months ago) - Modified
-
2023-10-30T10:06:58
(10 months ago) - Other Advisories
-
- ALAS-2022-1575
- ALAS-2022-1605
- ALAS-2022-1626
- ALAS2-2022-1766
- ALAS2-2022-1801
- ALAS2-2022-1815
- ALAS2-2022-1831
- ALAS2-2022-1832
- ALAS2-2023-1974
- ALAS2-2024-2502
- ALPINE:CVE-2022-0778
- ALPINE:CVE-2022-2097
- ALSA-2022:1065
- ALSA-2022:5326
- ALSA-2022:5818
- ALSA-2022:6224
- DSA-5103-1
- DSA-5139-1
- DSA-5169-1
- DSA-5343-1
- ELSA-2022-1065
- ELSA-2022-1066
- ELSA-2022-4899
- ELSA-2022-5326
- ELSA-2022-5818
- ELSA-2022-6224
- ELSA-2022-9224
- ELSA-2022-9225
- ELSA-2022-9233
- ELSA-2022-9237
- ELSA-2022-9243
- ELSA-2022-9246
- ELSA-2022-9249
- ELSA-2022-9255
- ELSA-2022-9258
- ELSA-2022-9272
- ELSA-2022-9683
- ELSA-2022-9751
- FEDORA-2022-3b7d0abd0b
- FEDORA-2022-3fdc2d3047
- FEDORA-2022-41890e9e44
- FEDORA-2022-89a17be281
- FEDORA-2022-8bb51f6901
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-a5f51502f0
- FEDORA-2022-b651cb69e6
- FEDORA-2022-c9c02865f6
- FREEBSD:4B9C1C17-587C-11ED-856E-D4C9EF517024
- FREEBSD:4EEB93BF-F204-11EC-8FBD-D4C9EF517024
- FREEBSD:8E150606-08C9-11ED-856E-D4C9EF517024
- FREEBSD:A28E8B7E-FC70-11EC-856E-D4C9EF517024
- FREEBSD:ADD683BE-BD76-11EC-A06F-D4C9EF517024
- FREEBSD:B9210706-FEB0-11EC-81FA-1C697A616631
- FREEBSD:EA05C456-A4FD-11EC-90DE-1C697AA5A594
- FREEBSD:FCEB2B08-CB76-11EC-A06F-D4C9EF517024
- GLSA-202210-02
- GLSA-202405-29
- MS:CVE-2022-0778
- MS:CVE-2022-1292
- MS:CVE-2022-2068
- MS:CVE-2022-2097
- openSUSE-SU-2022:0856-1
- openSUSE-SU-2022:2328-1
- RHSA-2022:1065
- RHSA-2022:1066
- RHSA-2022:4899
- RHSA-2022:5326
- RHSA-2022:5818
- RHSA-2022:6224
- RLSA-2022:1065
- RLSA-2022:4899
- RLSA-2022:5326
- RLSA-2022:5818
- RUSTSEC-2022-0014
- RUSTSEC-2022-0032
- SECADV-20220315-1
- SECADV-20220503-1
- SECADV-20220621-1
- SECADV-20220705-1
- SSA:2022-076-02
- SSA:2022-124-02
- SSA:2022-174-01
- SSA:2022-179-03
- SSA:2022-186-01
- SUSE-SU-2022:0851-1
- SUSE-SU-2022:0853-1
- SUSE-SU-2022:0854-1
- SUSE-SU-2022:0856-1
- SUSE-SU-2022:0857-1
- SUSE-SU-2022:0859-1
- SUSE-SU-2022:0860-1
- SUSE-SU-2022:0861-1
- SUSE-SU-2022:0935-1
- SUSE-SU-2022:1459-1
- SUSE-SU-2022:1461-1
- SUSE-SU-2022:1462-1
- SUSE-SU-2022:1536-1
- SUSE-SU-2022:2068-1
- SUSE-SU-2022:2075-1
- SUSE-SU-2022:2098-1
- SUSE-SU-2022:2106-1
- SUSE-SU-2022:2179-1
- SUSE-SU-2022:2180-1
- SUSE-SU-2022:2181-1
- SUSE-SU-2022:2182-1
- SUSE-SU-2022:2197-1
- SUSE-SU-2022:2251-1
- SUSE-SU-2022:2251-2
- SUSE-SU-2022:2306-1
- SUSE-SU-2022:2308-1
- SUSE-SU-2022:2309-1
- SUSE-SU-2022:2311-1
- SUSE-SU-2022:2312-1
- SUSE-SU-2022:2321-1
- SUSE-SU-2022:2328-1
- SUSE-SU-2022:2417-1
- USN-5328-1
- USN-5328-2
- USN-5402-1
- USN-5402-2
- USN-5488-1
- USN-5488-2
- USN-5502-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nodejs?distro=jammy | ubuntu | nodejs | < 12.22.9~dfsg-1ubuntu3.1 | jammy | ||
Affected | pkg:deb/ubuntu/nodejs-doc?distro=jammy | ubuntu | nodejs-doc | < 12.22.9~dfsg-1ubuntu3.1 | jammy | ||
Affected | pkg:deb/ubuntu/libnode72?distro=jammy | ubuntu | libnode72 | < 12.22.9~dfsg-1ubuntu3.1 | jammy | ||
Affected | pkg:deb/ubuntu/libnode-dev?distro=jammy | ubuntu | libnode-dev | < 12.22.9~dfsg-1ubuntu3.1 | jammy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |