Critical Node.js 20 Vulnerabilities in SUSE Security Advisory
Summary
## This update for nodejs20 fixes the following issues: Update to 20.15.1: * CVE-2024-36138: Fixed CVE-2024-27980 fix bypass (bsc#1227560) * CVE-2024-22020: Fixed a bypass of network import restriction via data URL (bsc#1227554) * CVE-2024-22018: Fixed fs.lstat bypasses permission model (bsc#1227562) * CVE-2024-36137: Fixed fs.fchown/fchmod bypasses permission model (bsc#1227561) * CVE-2024-37372: Fixed Permission model improperly processes UNC paths (bsc#1227563) Changes in 20.15.0: * test_runner: support test plans * inspector: introduce the --inspect-wait flag * zlib: expose zlib.crc32() * cli: allow running wasm in limited vmem with --disable-wasm-trap-handler Changes in 20.14.0 * src,permission: throw async errors on async APIs * test_runner: support forced exit Changes in 20.13.1: * buffer: improve base64 and base64url performance * crypto: deprecate implicitly shortened GCM tags * events,doc: mark CustomEvent as stable * fs:...
Read the Full AdvisoryReferences
* bsc#1227554
* bsc#1227560
* bsc#1227561
* bsc#1227562
* bsc#1227563
Cross-
* CVE-2024-22018
* CVE-2024-22020
* CVE-2024-27980
* CVE-2024-36137
* CVE-2024-36138
* CVE-2024-37372
CVSS scores:
* CVE-2024-22018 ( SUSE ): 2.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
* CVE-2024-22020 ( SUSE ): 6.5 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H
* CVE-2024-36137 ( SUSE ): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.5
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* Web and Scripting Module 15-SP5
An update that solves six vulnerabilities can now be installed.
##
* https://www.suse.com/security/cve/CVE-2024-22018.html
* https://www.suse.com/security/cve/CVE-2024-22020.html
* https://www.suse.com/security/cve/CVE-2024-27980.html
* https://www.suse.com/security/cve/CVE-2024-36137.html
* https://www.suse.com/...
Read the Full Advisory