Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 924704 (CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-22025) - <net-libs/nodejs-{18.19.1,20.11.0}: Multiple vulnerabilities
Summary: <net-libs/nodejs-{18.19.1,20.11.0}: Multiple vulnerabilities
Status: CONFIRMED
Alias: CVE-2023-46809, CVE-2024-21890, CVE-2024-21891, CVE-2024-21892, CVE-2024-21896, CVE-2024-22017, CVE-2024-22019, CVE-2024-22025
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B2 [stable?]
Keywords:
Depends on:
Blocks:
 
Reported: 2024-02-16 09:53 UTC by m1027
Modified: 2024-04-18 19:26 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description m1027 2024-02-16 09:53:58 UTC
The current nodejs-20.11.0 is said to have a lot of vulnerabilities, being fixed in 20.11.1.

Please add 20.11.1 to portage.

FYI, the nodejs changelog for 20.11.1:

https://github.com/nodejs/node/blob/main/doc/changelogs/CHANGELOG_V20.md#20.11.1
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2024-02-17 01:55:14 UTC
commit bff27b8be4bffecfe39c19f17754a5ae7a3c21d2
Author: William Hubbs <williamh@gentoo.org>
Date:   Fri Feb 16 12:39:31 2024 -0600

    net-libs/nodejs: add 18.19.1

    Signed-off-by: William Hubbs <williamh@gentoo.org>

commit 4659eec27a32476ee8d7549d6dcbcb4b7baa5497
Author: William Hubbs <williamh@gentoo.org>
Date:   Fri Feb 16 12:39:31 2024 -0600

    net-libs/nodejs: add 20.11.1

    Signed-off-by: William Hubbs <williamh@gentoo.org>
Comment 2 m1027 2024-02-17 06:21:55 UTC
Thanks!
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2024-02-18 09:53:11 UTC
Turning it into a security bug (sorry, I meant to do that before, but wanted to post the comment as a reminder for myself...)

CVE-2024-21892 - Code injection and privilege escalation through Linux capabilities- (High)
CVE-2024-22019 - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High)
CVE-2024-21896 - Path traversal by monkey-patching Buffer internals- (High)
CVE-2024-22017 - setuid() does not drop all privileges due to io_uring - (High)
CVE-2023-46809 - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium)
CVE-2024-21891 - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium)
CVE-2024-21890 - Improper handling of wildcards in --allow-fs-read and --allow-fs-write (Medium)
CVE-2024-22025 - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium)
Comment 4 m1027 2024-04-18 19:26:41 UTC
FYI: 20.11.1 has recently been removed from portage in favor of 20.12.1. But since 20.12.1 has other isues (BTW: some ssl related) I am forced now to go back to 20.11.0 which has the said vulnearbilities mentioned here... I'd be happy if I had 20.11.1 around for a while.