An update for nodejs is now available for openEuler-22.03-LTS-SP2 Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2024-1138 Final 1.0 1.0 2024-02-08 Initial 2024-02-08 2024-02-08 openEuler SA Tool V1.0 2024-02-08 nodejs security update An update for nodejs is now available for openEuler-22.03-LTS-SP2. Node.js is an open-source, cross-platform, JavaScript runtime environment, it executes JavaScript code outside of a browser. Security Fix(es): A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.(CVE-2023-0464) Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.(CVE-2023-0465) An update for nodejs is now available for openEuler-22.03-LTS-SP2. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High nodejs https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1138 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0464 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0465 https://nvd.nist.gov/vuln/detail/CVE-2023-0464 https://nvd.nist.gov/vuln/detail/CVE-2023-0465 openEuler-22.03-LTS-SP2 v8-devel-7.8.279.23-1.12.22.11.9.oe2203sp2.aarch64.rpm nodejs-debuginfo-12.22.11-9.oe2203sp2.aarch64.rpm nodejs-full-i18n-12.22.11-9.oe2203sp2.aarch64.rpm npm-6.14.16-1.12.22.11.9.oe2203sp2.aarch64.rpm nodejs-debugsource-12.22.11-9.oe2203sp2.aarch64.rpm nodejs-libs-12.22.11-9.oe2203sp2.aarch64.rpm nodejs-devel-12.22.11-9.oe2203sp2.aarch64.rpm nodejs-12.22.11-9.oe2203sp2.aarch64.rpm nodejs-docs-12.22.11-9.oe2203sp2.noarch.rpm nodejs-12.22.11-9.oe2203sp2.src.rpm nodejs-12.22.11-9.oe2203sp2.x86_64.rpm nodejs-debuginfo-12.22.11-9.oe2203sp2.x86_64.rpm nodejs-debugsource-12.22.11-9.oe2203sp2.x86_64.rpm npm-6.14.16-1.12.22.11.9.oe2203sp2.x86_64.rpm nodejs-full-i18n-12.22.11-9.oe2203sp2.x86_64.rpm nodejs-libs-12.22.11-9.oe2203sp2.x86_64.rpm nodejs-devel-12.22.11-9.oe2203sp2.x86_64.rpm v8-devel-7.8.279.23-1.12.22.11.9.oe2203sp2.x86_64.rpm A security vulnerability has been identified in all supported versionsof OpenSSL related to the verification of X.509 certificate chainsthat include policy constraints. Attackers may be able to exploit thisvulnerability by creating a malicious certificate chain that triggersexponential use of computational resources, leading to a denial-of-service(DoS) attack on affected systems.Policy processing is disabled by default but can be enabled by passingthe `-policy argument to the command line utilities or by calling the`X509_VERIFY_PARAM_set1_policies() function. 2024-02-08 CVE-2023-0464 openEuler-22.03-LTS-SP2 High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H nodejs security update 2024-02-08 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1138 Applications that use a non-default option when verifying certificates may bevulnerable to an attack from a malicious CA to circumvent certain checks.Invalid certificate policies in leaf certificates are silently ignored byOpenSSL and other certificate policy checks are skipped for that certificate.A malicious CA could use this to deliberately assert invalid certificate policiesin order to circumvent policy checking on the certificate altogether.Policy processing is disabled by default but can be enabled by passingthe `-policy argument to the command line utilities or by calling the`X509_VERIFY_PARAM_set1_policies() function. 2024-02-08 CVE-2023-0465 openEuler-22.03-LTS-SP2 Medium 5.3 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N nodejs security update 2024-02-08 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1138