SUSE-SU-2022:2415-1

Source
https://www.suse.com/support/update/announcement/2022/suse-su-20222415-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2022:2415-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2022:2415-1
Related
Published
2022-07-15T15:35:27Z
Modified
2022-07-15T15:35:27Z
Summary
Security update for nodejs16
Details

This update for nodejs16 fixes the following issues:

  • CVE-2022-32212: Fixed DNS rebinding in --inspect via invalid IP addresses (bsc#1201328).
  • CVE-2022-32213: Fixed HTTP request smuggling due to flawed parsing of Transfer-Encoding (bsc#1201325).
  • CVE-2022-32214: Fixed HTTP request smuggling due to improper delimiting of header fields (bsc#1201326).
  • CVE-2022-32215: Fixed HTTP request smuggling due to incorrect parsing of multi-line Transfer-Encoding (bsc#1201327).

The following non-security bug was fixed:

  • Add buildtime version check to determine if we need patched openssl Requires: or already in upstream. (bsc#1192489)
References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 12 / nodejs16

Package

Name
nodejs16
Purl
purl:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
16.16.0-8.6.1

Ecosystem specific

{
    "binaries": [
        {
            "nodejs16-docs": "16.16.0-8.6.1",
            "nodejs16": "16.16.0-8.6.1",
            "npm16": "16.16.0-8.6.1",
            "nodejs16-devel": "16.16.0-8.6.1"
        }
    ]
}