Summary: | <net-libs/nodejs-{18.19.1,20.11.0}: Multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | m1027 <m1027> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | CONFIRMED --- | ||
Severity: | normal | CC: | ajak, m1027, williamh |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | B2 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 930080 | ||
Bug Blocks: |
Description
m1027
2024-02-16 09:53:58 UTC
commit bff27b8be4bffecfe39c19f17754a5ae7a3c21d2 Author: William Hubbs <williamh@gentoo.org> Date: Fri Feb 16 12:39:31 2024 -0600 net-libs/nodejs: add 18.19.1 Signed-off-by: William Hubbs <williamh@gentoo.org> commit 4659eec27a32476ee8d7549d6dcbcb4b7baa5497 Author: William Hubbs <williamh@gentoo.org> Date: Fri Feb 16 12:39:31 2024 -0600 net-libs/nodejs: add 20.11.1 Signed-off-by: William Hubbs <williamh@gentoo.org> Thanks! Turning it into a security bug (sorry, I meant to do that before, but wanted to post the comment as a reminder for myself...) CVE-2024-21892 - Code injection and privilege escalation through Linux capabilities- (High) CVE-2024-22019 - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High) CVE-2024-21896 - Path traversal by monkey-patching Buffer internals- (High) CVE-2024-22017 - setuid() does not drop all privileges due to io_uring - (High) CVE-2023-46809 - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium) CVE-2024-21891 - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium) CVE-2024-21890 - Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium) CVE-2024-22025 - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium) FYI: 20.11.1 has recently been removed from portage in favor of 20.12.1. But since 20.12.1 has other isues (BTW: some ssl related) I am forced now to go back to 20.11.0 which has the said vulnearbilities mentioned here... I'd be happy if I had 20.11.1 around for a while. |