Lucene search

K
suseSuseOPENSUSE-SU-2021:0064-1
HistoryJan 15, 2021 - 12:00 a.m.

Security update for nodejs12 (moderate)

2021-01-1500:00:00
lists.opensuse.org
19

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

An update that fixes four vulnerabilities is now available.

Description:

This update for nodejs12 fixes the following issues:

  • New upstream LTS version 12.20.1:

    • CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS
      implementation. When writing to a TLS enabled socket,
      node::StreamBase::Write calls node::TLSWrap::DoWrite with a freshly
      allocated WriteWrap object as first argument. If the DoWrite method
      does not return an error, this object is passed back to the caller as
      part of a StreamWriteResult structure. This may be exploited to
      corrupt memory leading to a Denial of Service or potentially other
      exploits (bsc#1180553)
    • CVE-2020-8287: HTTP Request Smuggling allow two copies of a header
      field in a http request. For example, two Transfer-Encoding header
      fields. In this case Node.js identifies the first header field and
      ignores the second. This can lead to HTTP Request Smuggling
      (https://cwe.mitre.org/data/definitions/444.html). (bsc#1180554)
    • CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference (High)
      This is a vulnerability in OpenSSL which may be exploited through
      Node.js. (bsc#1179491)
  • New upstream LTS version 12.20.0:

    • deps:
      • update llhttp ‘2.1.2’ -> ‘2.1.3’
      • update uv ‘1.39.0’ -> ‘1.40.0’
      • update uvwasi ‘0.0.10’ -> ‘0.0.11’
    • fs: add .ref() and .unref() methods to watcher classes
    • http: added scheduling option to http agent
    • module:
      • exports pattern support
      • named exports for CJS via static analysis
    • n-api: add more property defaults (gh#35214)
  • New upstream LTS version 12.19.1:

    • deps: Denial of Service through DNS request (High). A Node.js
      application that allows an attacker to trigger a DNS request for a
      host of their choice could trigger a Denial of Service by getting the
      application to resolve a DNS record with a larger number of responses
      (bsc#1178882, CVE-2020-8277)
  • New upstream LTS version 12.19.0:

    • crypto: add randomInt function
    • deps:
      • upgrade to libuv 1.39.0
      • deps: upgrade npm to 6.14.7
      • deps: upgrade to libuv 1.38.1
    • doc: deprecate process.umask() with no arguments
    • module:
      • package “imports” field
      • module: deprecate module.parent
    • n-api: create N-API version 7
    • zlib: switch to lazy init for zlib streams

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Patch Instructions:

To install this openSUSE Security Update use the SUSE recommended installation methods
like YaST online_update or “zypper patch”.

Alternatively you can run the command listed for your product:

  • openSUSE Leap 15.2:

    zypper in -t patch openSUSE-2021-64=1

OSVersionArchitecturePackageVersionFilename
openSUSE Leap15.2x86_64< - openSUSE Leap 15.2 (x86_64):- openSUSE Leap 15.2 (x86_64):.x86_64.rpm
openSUSE Leap15.2noarch< - openSUSE Leap 15.2 (noarch):- openSUSE Leap 15.2 (noarch):.noarch.rpm

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P