Описание
Security update for nodejs20
This update for nodejs20 fixes the following issues:
Update to 20.15.1:
- CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560)
- CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554)
- CVE-2024-22018: Fixed fs.lstat bypasses permission model (bsc#1227562)
- CVE-2024-36137: Fixed fs.fchown/fchmod bypasses permission model (bsc#1227561)
- CVE-2024-37372: Fixed Permission model improperly processes UNC paths (bsc#1227563)
Changes in 20.15.0:
- test_runner: support test plans
- inspector: introduce the --inspect-wait flag
- zlib: expose zlib.crc32()
- cli: allow running wasm in limited vmem with --disable-wasm-trap-handler
Changes in 20.14.0
- src,permission: throw async errors on async APIs
- test_runner: support forced exit
Changes in 20.13.1:
- buffer: improve base64 and base64url performance
- crypto: deprecate implicitly shortened GCM tags
- events,doc: mark CustomEvent as stable
- fs: add stacktrace to fs/promises
- report: add --report-exclude-network option
- src: add uv_get_available_memory to report and process
- stream: support typed arrays
- util: support array of formats in util.styleText
- v8: implement v8.queryObjects() for memory leak regression testing
- watch: mark as stable
Список пакетов
Container bci/nodejs:latest
SUSE Linux Enterprise Module for Web and Scripting 15 SP6
openSUSE Leap 15.6
Ссылки
- Link for SUSE-SU-2024:2574-1
- E-Mail link for SUSE-SU-2024:2574-1
- SUSE Security Ratings
- SUSE Bug 1227554
- SUSE Bug 1227560
- SUSE Bug 1227561
- SUSE Bug 1227562
- SUSE Bug 1227563
- SUSE CVE CVE-2024-22018 page
- SUSE CVE CVE-2024-22020 page
- SUSE CVE CVE-2024-27980 page
- SUSE CVE CVE-2024-36137 page
- SUSE CVE CVE-2024-36138 page
- SUSE CVE CVE-2024-37372 page
Описание
A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-read flag is used. This flaw arises from an inadequate permission model that fails to restrict file stats through the fs.lstat API. As a result, malicious actors can retrieve stats from files that they do not have explicit read access to. This vulnerability affects all users using the experimental permission model in Node.js 20 and Node.js 21. Please note that at the time this CVE was issued, the permission model is an experimental feature of Node.js.
Затронутые продукты
Ссылки
- CVE-2024-22018
- SUSE Bug 1227562
Описание
A security flaw in Node.js allows a bypass of network import restrictions. By embedding non-network imports in data URLs, an attacker can execute arbitrary code, compromising system security. Verified on various platforms, the vulnerability is mitigated by forbidding data URLs in network imports. Exploiting this flaw can violate network import security, posing a risk to developers and servers.
Затронутые продукты
Ссылки
- CVE-2024-22020
- SUSE Bug 1227554
Описание
Due to the improper handling of batch files in child_process.spawn / child_process.spawnSync, a malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Затронутые продукты
Ссылки
- CVE-2024-27980
- SUSE Bug 1222665
- SUSE Bug 1227560
Описание
A vulnerability has been identified in Node.js, affecting users of the experimental permission model when the --allow-fs-write flag is used. Node.js Permission Model do not operate on file descriptors, however, operations such as fs.fchown or fs.fchmod can use a "read-only" file descriptor to change the owner and permissions of a file.
Затронутые продукты
Ссылки
- CVE-2024-36137
- SUSE Bug 1227561
Описание
Bypass incomplete fix of CVE-2024-27980, that arises from improper handling of batch files with all possible extensions on Windows via child_process.spawn / child_process.spawnSync. A malicious command line argument can inject arbitrary commands and achieve code execution even if the shell option is not enabled.
Затронутые продукты
Ссылки
- CVE-2024-36138
- SUSE Bug 1227560
Описание
The Permission Model assumes that any path starting with two backslashes \ has a four-character prefix that can be ignored, which is not always true. This subtle bug leads to vulnerable edge cases.
Затронутые продукты
Ссылки
- CVE-2024-37372
- SUSE Bug 1227563