Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0234-1

Опубликовано: 24 янв. 2025
Источник: suse-cvrf

Описание

Security update for nodejs18

This update for nodejs18 fixes the following issues:

Update to 18.20.6:

  • CVE-2025-23085: Fixed HTTP2 memory leak on premature close and ERR_PROTO (bsc#1236250)
  • CVE-2025-22150: Fixed insufficiently random values used when defining the boundary for a multipart/form-data request in undici (bsc#1236258)

Список пакетов

SUSE Linux Enterprise Server 12 SP5-LTSS
nodejs18-18.20.6-8.33.1
nodejs18-devel-18.20.6-8.33.1
nodejs18-docs-18.20.6-8.33.1
npm18-18.20.6-8.33.1
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5
nodejs18-18.20.6-8.33.1
nodejs18-devel-18.20.6-8.33.1
nodejs18-docs-18.20.6-8.33.1
npm18-18.20.6-8.33.1

Описание

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-devel-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-docs-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:npm18-18.20.6-8.33.1

Ссылки

Описание

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.


Затронутые продукты
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-devel-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:nodejs18-docs-18.20.6-8.33.1
SUSE Linux Enterprise Server 12 SP5-LTSS:npm18-18.20.6-8.33.1

Ссылки