Lucene search

K
ubuntuUbuntuUSN-6735-1
HistoryApr 16, 2024 - 12:00 a.m.

Node.js vulnerabilities

2024-04-1600:00:00
ubuntu.com
8
vulnerabilities
node.js
x509 certificate
http request
denial of service
unauthorised access
documentation inconsistency
ubuntu

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.8%

Releases

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM
  • Ubuntu 16.04 ESM
  • Ubuntu 14.04 ESM

Packages

  • nodejs - An open-source, cross-platform JavaScript runtime environment.

Details

It was discovered that Node.js incorrectly handled the use of invalid public
keys while creating an x509 certificate. If a user or an automated system were
tricked into opening a specially crafted input file, a remote attacker could
possibly use this issue to cause a denial of service. This issue only affected
Ubuntu 23.10. (CVE-2023-30588)

It was discovered that Node.js incorrectly handled the use of CRLF sequences to
delimit HTTP requests. If a user or an automated system were tricked into
opening a specially crafted input file, a remote attacker could possibly use
this issue to obtain unauthorised access. This issue only affected
Ubuntu 23.10. (CVE-2023-30589)

It was discovered that Node.js incorrectly described the generateKeys()
function in the documentation. This inconsistency could possibly lead to
security issues in applications that use these APIs.
(CVE-2023-30590)

OSVersionArchitecturePackageVersionFilename
Ubuntu23.10noarchlibnode-dev< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu23.10noarchlibnode108< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu23.10noarchlibnode108-dbgsym< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu23.10noarchnodejs< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu23.10noarchnodejs-dbgsym< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu23.10noarchnodejs-doc< 18.13.0+dfsg1-1ubuntu2.2UNKNOWN
Ubuntu22.04noarchlibnode-dev< 12.22.9~dfsg-1ubuntu3.5UNKNOWN
Ubuntu22.04noarchlibnode72< 12.22.9~dfsg-1ubuntu3.5UNKNOWN
Ubuntu22.04noarchlibnode72-dbgsym< 12.22.9~dfsg-1ubuntu3.5UNKNOWN
Ubuntu22.04noarchnodejs< 12.22.9~dfsg-1ubuntu3.5UNKNOWN
Rows per page:
1-10 of 421

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

7.3 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

32.8%