Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2025:0237-1

Опубликовано: 24 янв. 2025
Источник: suse-cvrf

Описание

Security update for nodejs20

This update for nodejs20 fixes the following issues:

Update to 20.18.2:

  • CVE-2025-23083: Fixed worker permission bypass via InternalWorker leak in diagnostics (bsc#1236251)
  • CVE-2025-23085: Fixed HTTP2 memory leak on premature close and ERR_PROTO (bsc#1236250)
  • CVE-2025-22150: Fixed insufficiently random values used when defining the boundary for a multipart/form-data request in undici (bsc#1236258)

Список пакетов

Container bci/nodejs:latest
nodejs20-20.18.2-150600.3.9.1
npm20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6
nodejs20-20.18.2-150600.3.9.1
nodejs20-devel-20.18.2-150600.3.9.1
nodejs20-docs-20.18.2-150600.3.9.1
npm20-20.18.2-150600.3.9.1
openSUSE Leap 15.6
corepack20-20.18.2-150600.3.9.1
nodejs20-20.18.2-150600.3.9.1
nodejs20-devel-20.18.2-150600.3.9.1
nodejs20-docs-20.18.2-150600.3.9.1
npm20-20.18.2-150600.3.9.1

Описание

Undici is an HTTP/1.1 client. Starting in version 4.5.0 and prior to versions 5.28.5, 6.21.1, and 7.2.3, undici uses `Math.random()` to choose the boundary for a multipart/form-data request. It is known that the output of `Math.random()` can be predicted if several of its generated values are known. If there is a mechanism in an app that sends multipart requests to an attacker-controlled website, they can use this to leak the necessary values. Therefore, an attacker can tamper with the requests going to the backend APIs if certain conditions are met. This is fixed in versions 5.28.5, 6.21.1, and 7.2.3. As a workaround, do not issue multipart requests to attacker controlled servers.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.18.2-150600.3.9.1
Container bci/nodejs:latest:npm20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.18.2-150600.3.9.1

Ссылки

Описание

With the aid of the diagnostics_channel utility, an event can be hooked into whenever a worker thread is created. This is not limited only to workers but also exposes internal workers, where an instance of them can be fetched, and its constructor can be grabbed and reinstated for malicious usage. This vulnerability affects Permission Model users (--permission) on Node.js v20, v22, and v23.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.18.2-150600.3.9.1
Container bci/nodejs:latest:npm20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.18.2-150600.3.9.1

Ссылки

Описание

A memory leak could occur when a remote peer abruptly closes the socket without sending a GOAWAY notification. Additionally, if an invalid header was detected by nghttp2, causing the connection to be terminated by the peer, the same leak was triggered. This flaw could lead to increased memory consumption and potential denial of service under certain conditions. This vulnerability affects HTTP/2 Server users on Node.js v18.x, v20.x, v22.x and v23.x.


Затронутые продукты
Container bci/nodejs:latest:nodejs20-20.18.2-150600.3.9.1
Container bci/nodejs:latest:npm20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-20.18.2-150600.3.9.1
SUSE Linux Enterprise Module for Web and Scripting 15 SP6:nodejs20-devel-20.18.2-150600.3.9.1

Ссылки