VYPR

rpm package

suse/nodejs16&distro=SUSE Linux Enterprise Server for SAP Applications 15 SP3

pkg:rpm/suse/nodejs16&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3

Vulnerabilities (29)

  • CVE-2023-31147May 25, 2023
    affected < 16.20.1-150300.7.24.2fixed 16.20.1-150300.7.24.2

    c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the ra

  • CVE-2023-31130May 25, 2023
    affected < 16.20.1-150300.7.24.2fixed 16.20.1-150300.7.24.2

    c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an

  • CVE-2023-31124May 25, 2023
    affected < 16.20.1-150300.7.24.2fixed 16.20.1-150300.7.24.2

    c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take

  • CVE-2023-23920Feb 23, 2023
    affected < 16.19.1-150300.7.18.1fixed 16.19.1-150300.7.18.1

    An untrusted search path vulnerability exists in Node.js. <19.6.1, <18.14.1, <16.19.1, and <14.21.3 that could allow an attacker to search and potentially load ICU data when running with elevated privileges.

  • CVE-2023-23919Feb 23, 2023
    affected < 16.19.1-150300.7.18.1fixed 16.19.1-150300.7.18.1

    A cryptographic vulnerability exists in Node.js <19.2.0, <18.14.1, <16.19.1, <14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to b

  • CVE-2023-23918Feb 23, 2023
    affected < 16.19.1-150300.7.18.1fixed 16.19.1-150300.7.18.1

    A privilege escalation vulnerability exists in Node.js <19.6.1, <18.14.1, <16.19.1 and <14.21.3 that made it possible to bypass the experimental Permissions (https://nodejs.org/api/permissions.html) feature in Node.js and access non authorized modules by using process.mainModule.

  • CVE-2023-23936Feb 16, 2023
    affected < 16.19.1-150300.7.18.1fixed 16.19.1-150300.7.18.1

    Undici is an HTTP/1.1 client for Node.js. Starting with version 2.0.0 and prior to version 5.19.1, the undici library does not protect `host` HTTP header from CRLF injection vulnerabilities. This issue is patched in Undici v5.19.1. As a workaround, sanitize the `headers.host` str

  • CVE-2023-24807Feb 16, 2023
    affected < 16.19.1-150300.7.18.1fixed 16.19.1-150300.7.18.1

    Undici is an HTTP/1.1 client for Node.js. Prior to version 5.19.1, the `Headers.set()` and `Headers.append()` methods are vulnerable to Regular Expression Denial of Service (ReDoS) attacks when untrusted values are passed into the functions. This is due to the inefficient regular

  • CVE-2022-25881Jan 31, 2023
    affected < 16.20.0-150300.7.21.2fixed 16.20.0-150300.7.21.2

    This affects versions of the package http-cache-semantics before 4.1.1. The issue can be exploited via malicious request header values sent to a server, when that server reads the cache policy from the request using this library.

Page 2 of 2