SUSE Security Update: Security update for nodejs12
______________________________________________________________________________

Announcement ID:    SUSE-SU-2020:2812-1
Rating:             important
References:         #1172686 #1173937 #1176589 #1176605 
Cross-References:   CVE-2020-15095 CVE-2020-8201 CVE-2020-8252
                   
Affected Products:
                    SUSE Linux Enterprise Module for Web Scripting 12
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:

   This update for nodejs12 fixes the following issues:

   - nodejs12 was updated to 12.18.4 LTS:
      - CVE-2020-8201: Fixed an HTTP Request Smuggling due to CR-to-Hyphen
        conversion (bsc#1176605).
      - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589).
      - CVE-2020-15095: Fixed an information leak through log files
        (bsc#1173937).
   - Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation
     on Aarch64 with gcc10 (bsc#1172686)


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Module for Web Scripting 12:

      zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2020-2812=1



Package List:

   - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64):

      nodejs12-12.18.4-1.20.1
      nodejs12-debuginfo-12.18.4-1.20.1
      nodejs12-debugsource-12.18.4-1.20.1
      nodejs12-devel-12.18.4-1.20.1
      npm12-12.18.4-1.20.1

   - SUSE Linux Enterprise Module for Web Scripting 12 (noarch):

      nodejs12-docs-12.18.4-1.20.1


References:

   https://www.suse.com/security/cve/CVE-2020-15095.html
   https://www.suse.com/security/cve/CVE-2020-8201.html
   https://www.suse.com/security/cve/CVE-2020-8252.html
   https://bugzilla.suse.com/1172686
   https://bugzilla.suse.com/1173937
   https://bugzilla.suse.com/1176589
   https://bugzilla.suse.com/1176605

_______________________________________________
sle-security-updates mailing list
sle-security-updates@lists.suse.com
https://lists.suse.com/mailman/listinfo/sle-security-updates

SUSE: 2020:2812-1 important: nodejs12

October 1, 2020
An update that solves three vulnerabilities and has one errata is now available

Summary

This update for nodejs12 fixes the following issues: - nodejs12 was updated to 12.18.4 LTS: - CVE-2020-8201: Fixed an HTTP Request Smuggling due to CR-to-Hyphen conversion (bsc#1176605). - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589). - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937). - Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation on Aarch64 with gcc10 (bsc#1172686) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Module for Web Scripting 12: zypper in -t patch SUSE-SLE-Module-Web-Scripting-12-2020-2812=1 Package List: - SUSE Linux Enterprise Module for Web Scripting 12 (aarch64 ppc64le s390x x86_64): nodejs12-12.18.4-1.20.1 nodejs12-debuginfo-12.18.4-1.20.1 nodejs12-debugsource-12.18.4-1.20.1 nodejs12-devel-12.18.4-1.20.1 npm12-12.18.4-1.20.1 - SUSE Linux Enterprise Module for Web Scripting 12 (noarch): nodejs12-docs-12.18.4-1.20.1

References

#1172686 #1173937 #1176589 #1176605

Cross- CVE-2020-15095 CVE-2020-8201 CVE-2020-8252

Affected Products:

SUSE Linux Enterprise Module for Web Scripting 12

https://www.suse.com/security/cve/CVE-2020-15095.html

https://www.suse.com/security/cve/CVE-2020-8201.html

https://www.suse.com/security/cve/CVE-2020-8252.html

https://bugzilla.suse.com/1172686

https://bugzilla.suse.com/1173937

https://bugzilla.suse.com/1176589

https://bugzilla.suse.com/1176605

Severity
Announcement ID: SUSE-SU-2020:2812-1
Rating: important