MGASA-2023-0078

Source
https://advisories.mageia.org/MGASA-2023-0078.html
Import Source
https://advisories.mageia.org/MGASA-2023-0078.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0078
Related
Published
2023-03-01T21:14:31Z
Modified
2023-03-01T20:09:44Z
Summary
Updated nodejs packages fix security vulnerability
Details

The following CVEs are fixed in this release:

CVE-2023-23918: Node.js Permissions policies can be bypassed via process.mainModule (High) CVE-2023-23920: Node.js insecure loading of ICU data through ICU_DATA environment variable (Low) More detailed information on each of the vulnerabilities can be found in February 2023 Security Releases blog post.

This security release includes OpenSSL security updates as outlined in the recent OpenSSL security advisory.

This security release also includes an npm update for Node.js 14 to address a number of CVEs which either do not affect Node.js or are low severity in the context of Node.js. You can get more details for the individual CVEs in nodejs-dependency-vuln-assessments.

References
Credits

Affected packages

Mageia:8 / nodejs

Package

Name
nodejs
Purl
pkg:rpm/mageia/nodejs?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.21.3-2.1.mga8

Ecosystem specific

{
    "section": "core"
}