SUSE-SU-2021:0107-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:0107-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:0107-1
Related
Published
2021-01-13T08:53:01Z
Modified
2021-01-13T08:53:01Z
Summary
Security update for nodejs14
Details

This update for nodejs14 fixes the following issues:

  • New upstream LTS version 14.15.4:

    • CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS implementation. When writing to a TLS enabled socket, node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly allocated WriteWrap object as first argument. If the DoWrite method does not return an error, this object is passed back to the caller as part of a StreamWriteResult structure. This may be exploited to corrupt memory leading to a Denial of Service or potentially other exploits (bsc#1180553)
    • CVE-2020-8287: HTTP Request Smuggling allow two copies of a header field in a http request. For example, two Transfer-Encoding header fields. In this case Node.js identifies the first header field and ignores the second. This can lead to HTTP Request Smuggling (https://cwe.mitre.org/data/definitions/444.html). (bsc#1180554)
  • New upstream LTS version 14.15.3:

    • deps:
      • upgrade npm to 6.14.9
      • update acorn to v8.0.4
    • http2: check write not scheduled in scope destructor
    • stream: fix regression on duplex end
References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 12 / nodejs14

Package

Name
nodejs14
Purl
purl:rpm/suse/nodejs14&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
14.15.4-6.6.1

Ecosystem specific

{
    "binaries": [
        {
            "npm14": "14.15.4-6.6.1",
            "nodejs14": "14.15.4-6.6.1",
            "nodejs14-devel": "14.15.4-6.6.1",
            "nodejs14-docs": "14.15.4-6.6.1"
        }
    ]
}