CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
31.8%
Package : nodejs
Version : 10.24.0~dfsg-1~deb10u4
CVE ID : CVE-2023-30590 CVE-2023-46809 CVE-2024-22025
Debian Bug : 1039990 1064055
Vulnerabilities have been found in Node.js, which could lead to denial
of service or information disclosure.
CVE-2023-30590
Ben Smyth reported an inconsistency between implementation and
documented design of the The generateKeys() API function, which
only generates missing (or outdated) keys, that is, it only
generates a private key if none has been set yet.
The documented behavior has been updated to reflect the current
implementation.
CVE-2023-46809
It was discovered that Node.js was vulnerable to the Marvin Attack,
allowing a covert timing side-channel during PKCS#1 v1.5 padding
error handling. An attacker could remotely exploit the
vulnerability to decrypt captured RSA ciphertexts or forge
signatures, especially in scenarios involving API endpoints
processing Json Web Encryption messages.
The fix disables RSA_PKCS1_PADDING for crypto.privateDecrypt(), and
includes a security revert flag that can be used to restore support
(and the vulnerability).
CVE-2024-22025
It was discovered that Node.js was vulnerable to Denial of Service
by resource exhaustion in fetch() brotli decoding.
For Debian 10 buster, these problems have been fixed in version
10.24.0~dfsg-1~deb10u4.
We recommend that you upgrade your nodejs packages.
For the detailed security status of nodejs please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/nodejs
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | arm64 | nodejs-dbgsym | < 18.19.0+dfsg-6~deb12u1 | nodejs-dbgsym_18.19.0+dfsg-6~deb12u1_arm64.deb |
Debian | 12 | mipsel | libnode108 | < 18.19.0+dfsg-6~deb12u1 | libnode108_18.19.0+dfsg-6~deb12u1_mipsel.deb |
Debian | 10 | i386 | nodejs | < 10.24.0~dfsg-1~deb10u4 | nodejs_10.24.0~dfsg-1~deb10u4_i386.deb |
Debian | 12 | armel | nodejs | < 18.19.0+dfsg-6~deb12u1 | nodejs_18.19.0+dfsg-6~deb12u1_armel.deb |
Debian | 11 | amd64 | libnode-dev | < 12.22.12~dfsg-1~deb11u5 | libnode-dev_12.22.12~dfsg-1~deb11u5_amd64.deb |
Debian | 10 | arm64 | libnode64 | < 10.24.0~dfsg-1~deb10u4 | libnode64_10.24.0~dfsg-1~deb10u4_arm64.deb |
Debian | 12 | arm64 | libnode-dev | < 18.19.0+dfsg-6~deb12u1 | libnode-dev_18.19.0+dfsg-6~deb12u1_arm64.deb |
Debian | 11 | arm64 | libnode-dev | < 12.22.12~dfsg-1~deb11u5 | libnode-dev_12.22.12~dfsg-1~deb11u5_arm64.deb |
Debian | 12 | armhf | libnode108 | < 18.19.0+dfsg-6~deb12u1 | libnode108_18.19.0+dfsg-6~deb12u1_armhf.deb |
Debian | 10 | i386 | libnode-dev | < 10.24.0~dfsg-1~deb10u4 | libnode-dev_10.24.0~dfsg-1~deb10u4_i386.deb |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
31.8%