Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2024:2574-1

Опубликовано: 22 июл. 2024
Источник: suse-cvrf

Описание

Security update for nodejs20

This update for nodejs20 fixes the following issues:

Update to 20.15.1:

  • CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
  • CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)
  • CVE-2024-22018: Fixed fs.lstat bypasses permission model (bsc#1227562)
  • CVE-2024-36137: Fixed fs.fchown/fchmod bypasses permission model (bsc#1227561)
  • CVE-2024-37372: Fixed Permission model improperly processes UNC paths (bsc#1227563)

Changes in 20.15.0:

  • test_runner: support test plans
  • inspector: introduce the --inspect-wait flag
  • zlib: expose zlib.crc32()
  • cli: allow running wasm in limited vmem with --disable-wasm-trap-handler

Changes in 20.14.0

  • src,permission: throw async errors on async APIs
  • test_runner: support forced exit

Changes in 20.13.1:

  • buffer: improve base64 and base64url performance
  • crypto: deprecate implicitly shortened GCM tags
  • events,doc: mark CustomEvent as stable
  • fs: add stacktrace to fs/promises
  • report: add --report-exclude-network option
  • src: add uv_get_available_memory to report and process
  • stream: support typed arrays
  • util: support array of formats in util.styleText
  • v8: implement v8.queryObjects() for memory leak regression testing
  • watch: mark as stable

Список пакетов

Container bci/nodejs:latest
nodejs20-20.15.1-150600.3.3.2
npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6
nodejs20-20.15.1-150600.3.3.2
nodejs20-devel-20.15.1-150600.3.3.2
nodejs20-docs-20.15.1-150600.3.3.2
npm20-20.15.1-150600.3.3.2
openSUSE Leap 15.6
corepack20-20.15.1-150600.3.3.2
nodejs20-20.15.1-150600.3.3.2
nodejs20-devel-20.15.1-150600.3.3.2
nodejs20-docs-20.15.1-150600.3.3.2
npm20-20.15.1-150600.3.3.2

Описание

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки

Описание

A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки

Описание

Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки

Описание

A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки

Описание

Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки

Описание

The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.15.1-150600.3.3.2
Container bci/nodejs:latest:npm20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.15.1-150600.3.3.2
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.15.1-150600.3.3.2

Ссылки