Описание
Security update for nodejs18
This update for nodejs18 fixes the following issues:
Update to 18.19.1: (security updates)
- CVE-2024-21892: Code injection and privilege escalation through Linux capabilities (bsc#1219992).
- CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993).
- CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997).
- CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014).
- CVE-2024-24758: undici version 5.28.3 (bsc#1220017).
- CVE-2024-24806: libuv version 1.48.0 (bsc#1219724).
Update to LTS version 18.19.0
- deps: npm updates to 10.x
- esm:
- Leverage loaders when resolving subsequent loaders
- import.meta.resolve unflagged
- --experimental-default-type flag to flip module defaults
Список пакетов
Container bci/node:18
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS
SUSE Linux Enterprise Module for Web and Scripting 15 SP5
SUSE Linux Enterprise Server 15 SP4-LTSS
SUSE Linux Enterprise Server for SAP Applications 15 SP4
SUSE Manager Server 4.3
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2024:0730-1
- E-Mail link for SUSE-SU-2024:0730-1
- SUSE Security Ratings
- SUSE Bug 1219724
- SUSE Bug 1219992
- SUSE Bug 1219993
- SUSE Bug 1219997
- SUSE Bug 1220014
- SUSE Bug 1220017
- SUSE CVE CVE-2023-46809 page
- SUSE CVE CVE-2024-21892 page
- SUSE CVE CVE-2024-22019 page
- SUSE CVE CVE-2024-22025 page
- SUSE CVE CVE-2024-24758 page
- SUSE CVE CVE-2024-24806 page
Описание
Node.js versions which bundle an unpatched version of OpenSSL or run against a dynamically linked version of OpenSSL which are unpatched are vulnerable to the Marvin Attack - https://people.redhat.com/~hkario/marvin/, if PCKS #1 v1.5 padding is allowed when performing RSA descryption using a private key.
Затронутые продукты
Ссылки
- CVE-2023-46809
- SUSE Bug 1219997
Описание
On Linux, Node.js ignores certain environment variables if those may have been set by an unprivileged user while the process is running with elevated privileges with the only exception of CAP_NET_BIND_SERVICE. Due to a bug in the implementation of this exception, Node.js incorrectly applies this exception even when certain other capabilities have been set. This allows unprivileged users to inject code that inherits the process's elevated privileges.
Затронутые продукты
Ссылки
- CVE-2024-21892
- SUSE Bug 1219992
Описание
A vulnerability in Node.js HTTP servers allows an attacker to send a specially crafted HTTP request with chunked encoding, leading to resource exhaustion and denial of service (DoS). The server reads an unbounded number of bytes from a single connection, exploiting the lack of limitations on chunk extension bytes. The issue can cause CPU and network bandwidth exhaustion, bypassing standard safeguards like timeouts and body size limits.
Затронутые продукты
Ссылки
- CVE-2024-22019
- SUSE Bug 1219993
Описание
A vulnerability in Node.js has been identified, allowing for a Denial of Service (DoS) attack through resource exhaustion when using the fetch() function to retrieve content from an untrusted URL. The vulnerability stems from the fact that the fetch() function in Node.js always decodes Brotli, making it possible for an attacker to cause resource exhaustion when fetching content from an untrusted URL. An attacker controlling the URL passed into fetch() can exploit this vulnerability to exhaust memory, potentially leading to process termination, depending on the system configuration.
Затронутые продукты
Ссылки
- CVE-2024-22025
- SUSE Bug 1220014
Описание
Undici is an HTTP/1.1 client, written from scratch for Node.js. Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Proxy-Authentication` headers. This issue has been patched in versions 5.28.3 and 6.6.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Затронутые продукты
Ссылки
- CVE-2024-24758
- SUSE Bug 1220017
Описание
libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the `hostname_ascii` variable (with a length of 256 bytes) is handled in `uv_getaddrinfo` and subsequently in `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Затронутые продукты
Ссылки
- CVE-2024-24806
- SUSE Bug 1219724
- SUSE Bug 1220056