SUSE-SU-2024:0731-1

Source
https://www.suse.com/support/update/announcement/2024/suse-su-20240731-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2024:0731-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2024:0731-1
Related
Published
2024-02-29T12:01:07Z
Modified
2024-02-29T12:01:07Z
Summary
Security update for nodejs16
Details

This update for nodejs16 fixes the following issues:

Security issues fixed:

  • CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997).
  • CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993).
  • CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014).
  • CVE-2024-24758: ignore proxy-authorization header (bsc#1220017).
  • CVE-2024-24806: fix improper domain lookup that potentially leads to SSRF attacks (bsc#1219724).
References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 12 / nodejs16

Package

Name
nodejs16
Purl
purl:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
16.20.2-8.39.1

Ecosystem specific

{
    "binaries": [
        {
            "nodejs16-docs": "16.20.2-8.39.1",
            "nodejs16": "16.20.2-8.39.1",
            "npm16": "16.20.2-8.39.1",
            "nodejs16-devel": "16.20.2-8.39.1"
        }
    ]
}