Severity
Critical
Affected Packages
8
CVEs
3
Several security issues were fixed in Node.js.
It was discovered that Node.js incorrectly handled certain inputs when it is
using the policy mechanism. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to bypass the policy mechanism. (CVE-2023-32002, CVE-2023-32006)
It was discovered that Node.js incorrectly handled certain inputs when it is
using the policy mechanism. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to perform a privilege escalation. (CVE-2023-32559)
Package | Affected Version |
---|---|
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 |
- ID
- USN-6822-1
- Severity
- critical
- URL
- https://ubuntu.com/security/notices/USN-6822-1
- Published
-
2024-06-10T08:42:42
(6 weeks ago) - Modified
-
2024-06-10T08:42:42
(6 weeks ago) - Other Advisories
-
-
ALPINE:CVE-2023-32002
-
ALPINE:CVE-2023-32006
-
ALPINE:CVE-2023-32559
-
ALSA-2023:5360
-
ALSA-2023:5362
-
ALSA-2023:5363
-
ALSA-2023:5532
-
DSA-5589-1
-
ELSA-2023-5360
-
ELSA-2023-5362
-
ELSA-2023-5363
-
ELSA-2023-5532
-
GLSA-202405-29
-
RHSA-2023:5360
-
RHSA-2023:5362
-
RHSA-2023:5363
-
RHSA-2023:5532
-
RLSA-2023:5532
-
SUSE-SU-2023:3306-1
-
SUSE-SU-2023:3355-1
-
SUSE-SU-2023:3356-1
-
SUSE-SU-2023:3378-1
-
SUSE-SU-2023:3379-1
-
SUSE-SU-2023:3400-1
-
SUSE-SU-2023:3408-1
-
SUSE-SU-2023:3455-1
-
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/nodejs?distro=mantic | ubuntu |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 | mantic | ||
Affected | pkg:deb/ubuntu/nodejs?distro=jammy | ubuntu |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 | jammy | ||
Affected | pkg:deb/ubuntu/nodejs-doc?distro=mantic | ubuntu |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 | mantic | ||
Affected | pkg:deb/ubuntu/nodejs-doc?distro=jammy | ubuntu |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 | jammy | ||
Affected | pkg:deb/ubuntu/libnode72?distro=jammy | ubuntu |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 | jammy | ||
Affected | pkg:deb/ubuntu/libnode108?distro=mantic | ubuntu |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 | mantic | ||
Affected | pkg:deb/ubuntu/libnode-dev?distro=mantic | ubuntu |
![]() |
< 18.13.0+dfsg1-1ubuntu2.3 | mantic | ||
Affected | pkg:deb/ubuntu/libnode-dev?distro=jammy | ubuntu |
![]() |
< 12.22.9~dfsg-1ubuntu3.6 | jammy |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |