SUSE Security Update: Security update for nodejs10
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:1575-1
Rating:             critical
References:         #1166844 #1166916 #1172442 #1172443 
Cross-References:   CVE-2020-10531 CVE-2020-11080 CVE-2020-7598
                    CVE-2020-8174
Affected Products:
                    SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________

   An update that fixes four vulnerabilities is now available.

Description:

   This update for nodejs10 fixes the following issues:

   nodejs10 was updated to version 10.21.0

   - CVE-2020-8174: Fixed multiple memory corruption in
     napi_get_value_string_*() (bsc#1172443).
   - CVE-2020-11080: Fixed a potential denial of service when receiving
     unreasonably large HTTP/2 SETTINGS frames (bsc#1172442).
   - CVE-2020-10531: Fixed an integer overflow in UnicodeString:doAppend()
     (bsc#1166844).

   npm was updated to 6.14.3

   - CVE-2020-7598: Fixed an issue which could have tricked minimist into
     adding or modifying properties of Object.prototype (bsc#1166916).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Web Scripting 12:

      zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2020-1575=1



Package List:

   - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):

      nodejs10-10.21.0-1.24.1
      nodejs10-debuginfo-10.21.0-1.24.1
      nodejs10-debugsource-10.21.0-1.24.1
      nodejs10-devel-10.21.0-1.24.1
      npm10-10.21.0-1.24.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (noarch):

      nodejs10-docs-10.21.0-1.24.1


References:

   https://www.suse.com/security/cve/CVE-2020-10531.html
   https://www.suse.com/security/cve/CVE-2020-11080.html
   https://www.suse.com/security/cve/CVE-2020-7598.html
   https://www.suse.com/security/cve/CVE-2020-8174.html
   https://bugzilla.suse.com/1166844
   https://bugzilla.suse.com/1166916
   https://bugzilla.suse.com/1172442
   https://bugzilla.suse.com/1172443

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
http://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:1575-1 critical: nodejs10

June 9, 2020
An update that fixes four vulnerabilities is now available

Summary

This update for nodejs10 fixes the following issues: nodejs10 was updated to version 10.21.0 - CVE-2020-8174: Fixed multiple memory corruption in napi_get_value_string_*() (bsc#1172443). - CVE-2020-11080: Fixed a potential denial of service when receiving unreasonably large HTTP/2 SETTINGS frames (bsc#1172442). - CVE-2020-10531: Fixed an integer overflow in UnicodeString:doAppend() (bsc#1166844). npm was updated to 6.14.3 - CVE-2020-7598: Fixed an issue which could have tricked minimist into adding or modifying properties of Object.prototype (bsc#1166916). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2020-1575=1 Package List: - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): nodejs10-10.21.0-1.24.1 nodejs10-debuginfo-10.21.0-1.24.1 nodejs10-debugsource-10.21.0-1.24.1 nodejs10-devel-10.21.0-1.24.1 npm10-10.21.0-1.24.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): nodejs10-docs-10.21.0-1.24.1

References

#1166844 #1166916 #1172442 #1172443

Cross- CVE-2020-10531 CVE-2020-11080 CVE-2020-7598

CVE-2020-8174

Affected Products:

SUSE Linux Enterprise Module for Web Scripting 12

https://www.suse.com/security/cve/CVE-2020-10531.html

https://www.suse.com/security/cve/CVE-2020-11080.html

https://www.suse.com/security/cve/CVE-2020-7598.html

https://www.suse.com/security/cve/CVE-2020-8174.html

https://bugzilla.suse.com/1166844

https://bugzilla.suse.com/1166916

https://bugzilla.suse.com/1172442

https://bugzilla.suse.com/1172443

Severity
Announcement ID: SUSE-SU-2020:1575-1
Rating: critical

Related News