SUSE Security Update: Security update for nodejs10 ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:2829-1 Rating: important References: #1172686 #1173937 #1176589 Cross-References: CVE-2020-15095 CVE-2020-8252 Affected Products: SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Module for Web Scripting 15-SP2 SUSE Linux Enterprise Module for Web Scripting 15-SP1 SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-ESPOS ______________________________________________________________________________ An update that solves two vulnerabilities and has one errata is now available. Description: This update for nodejs10 fixes the following issues: - nodejs10 was updated to 10.22.1 LTS: - CVE-2020-8252: Fixed a buffer overflow in realpath (bsc#1176589). - CVE-2020-15095: Fixed an information leak through log files (bsc#1173937). - Explicitly add -fno-strict-aliasing to CFLAGS to fix compilation on Aarch64 with gcc10 (bsc#1172686) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-2829=1 - SUSE Linux Enterprise Server 15-LTSS: zypper in -t patch SUSE-SLE-Product-SLES-15-2020-2829=1 - SUSE Linux Enterprise Module for Web Scripting 15-SP2: zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP2-2020-2829=1 - SUSE Linux Enterprise Module for Web Scripting 15-SP1: zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP1-2020-2829=1 - SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2829=1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-2829=1 Package List: - SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise Server for SAP 15 (noarch): nodejs10-docs-10.22.1-1.27.1 - SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise Server 15-LTSS (noarch): nodejs10-docs-10.22.1-1.27.1 - SUSE Linux Enterprise Module for Web Scripting 15-SP2 (aarch64 ppc64le s390x x86_64): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise Module for Web Scripting 15-SP2 (noarch): nodejs10-docs-10.22.1-1.27.1 - SUSE Linux Enterprise Module for Web Scripting 15-SP1 (aarch64 ppc64le s390x x86_64): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise Module for Web Scripting 15-SP1 (noarch): nodejs10-docs-10.22.1-1.27.1 - SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch): nodejs10-docs-10.22.1-1.27.1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64): nodejs10-10.22.1-1.27.1 nodejs10-debuginfo-10.22.1-1.27.1 nodejs10-debugsource-10.22.1-1.27.1 nodejs10-devel-10.22.1-1.27.1 npm10-10.22.1-1.27.1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch): nodejs10-docs-10.22.1-1.27.1 References: https://www.suse.com/security/cve/CVE-2020-15095.html https://www.suse.com/security/cve/CVE-2020-8252.html https://bugzilla.suse.com/1172686 https://bugzilla.suse.com/1173937 https://bugzilla.suse.com/1176589 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com https://lists.suse.com/mailman/listinfo/sle-security-updates