cvrf2cusa/cvrf/2024/cvrf-openEuler-SA-2024-1136.xml
Jia Chao 0b34274085 git mv
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-25 09:57:37 +08:00

169 lines
10 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
<DocumentTitle xml:lang="en">An update for nodejs is now available for openEuler-22.03-LTS</DocumentTitle>
<DocumentType>Security Advisory</DocumentType>
<DocumentPublisher Type="Vendor">
<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
<IssuingAuthority>openEuler security committee</IssuingAuthority>
</DocumentPublisher>
<DocumentTracking>
<Identification>
<ID>openEuler-SA-2024-1136</ID>
</Identification>
<Status>Final</Status>
<Version>1.0</Version>
<RevisionHistory>
<Revision>
<Number>1.0</Number>
<Date>2024-02-08</Date>
<Description>Initial</Description>
</Revision>
</RevisionHistory>
<InitialReleaseDate>2024-02-08</InitialReleaseDate>
<CurrentReleaseDate>2024-02-08</CurrentReleaseDate>
<Generator>
<Engine>openEuler SA Tool V1.0</Engine>
<Date>2024-02-08</Date>
</Generator>
</DocumentTracking>
<DocumentNotes>
<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">nodejs security update</Note>
<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for nodejs is now available for openEuler-22.03-LTS.</Note>
<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Node.js is an open-source, cross-platform, JavaScript runtime environment, it executes JavaScript code outside of a browser.
Security Fix(es):
A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy&apos; argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()&apos; function.(CVE-2023-0464)
Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the `-policy&apos; argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()&apos; function.(CVE-2023-0465)</Note>
<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for nodejs is now available for openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">High</Note>
<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">nodejs</Note>
</DocumentNotes>
<DocumentReferences>
<Reference Type="Self">
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1136</URL>
</Reference>
<Reference Type="openEuler CVE">
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0464</URL>
<URL>https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2023-0465</URL>
</Reference>
<Reference Type="Other">
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0464</URL>
<URL>https://nvd.nist.gov/vuln/detail/CVE-2023-0465</URL>
</Reference>
</DocumentReferences>
<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
<Branch Type="Product Name" Name="openEuler">
<FullProductName ProductID="openEuler-22.03-LTS" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">openEuler-22.03-LTS</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="aarch64">
<FullProductName ProductID="nodejs-libs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-libs-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="nodejs-full-i18n-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-full-i18n-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="nodejs-debugsource-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-debugsource-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="nodejs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="npm-6.14.16-1.12.22.11.9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">npm-6.14.16-1.12.22.11.9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="nodejs-debuginfo-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-debuginfo-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="v8-devel-7.8.279.23-1.12.22.11.9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">v8-devel-7.8.279.23-1.12.22.11.9.oe2203.aarch64.rpm</FullProductName>
<FullProductName ProductID="nodejs-devel-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-devel-12.22.11-9.oe2203.aarch64.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="noarch">
<FullProductName ProductID="nodejs-docs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-docs-12.22.11-9.oe2203.noarch.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="src">
<FullProductName ProductID="nodejs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-12.22.11-9.oe2203.src.rpm</FullProductName>
</Branch>
<Branch Type="Package Arch" Name="x86_64">
<FullProductName ProductID="nodejs-devel-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-devel-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="nodejs-debuginfo-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-debuginfo-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="nodejs-debugsource-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-debugsource-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="npm-6.14.16-1.12.22.11.9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">npm-6.14.16-1.12.22.11.9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="nodejs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="nodejs-libs-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-libs-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="v8-devel-7.8.279.23-1.12.22.11.9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">v8-devel-7.8.279.23-1.12.22.11.9.oe2203.x86_64.rpm</FullProductName>
<FullProductName ProductID="nodejs-full-i18n-12.22.11-9" CPE="cpe:/a:openEuler:openEuler:22.03-LTS">nodejs-full-i18n-12.22.11-9.oe2203.x86_64.rpm</FullProductName>
</Branch>
</ProductTree>
<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A security vulnerability has been identified in all supported versionsof OpenSSL related to the verification of X.509 certificate chainsthat include policy constraints. Attackers may be able to exploit thisvulnerability by creating a malicious certificate chain that triggersexponential use of computational resources, leading to a denial-of-service(DoS) attack on affected systems.Policy processing is disabled by default but can be enabled by passingthe `-policy argument to the command line utilities or by calling the`X509_VERIFY_PARAM_set1_policies() function.</Note>
</Notes>
<ReleaseDate>2024-02-08</ReleaseDate>
<CVE>CVE-2023-0464</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>High</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>7.5</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>nodejs security update</Description>
<DATE>2024-02-08</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1136</URL>
</Remediation>
</Remediations>
</Vulnerability>
<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
<Notes>
<Note Title="Vulnerability Description" Type="General" Ordinal="2" xml:lang="en">Applications that use a non-default option when verifying certificates may bevulnerable to an attack from a malicious CA to circumvent certain checks.Invalid certificate policies in leaf certificates are silently ignored byOpenSSL and other certificate policy checks are skipped for that certificate.A malicious CA could use this to deliberately assert invalid certificate policiesin order to circumvent policy checking on the certificate altogether.Policy processing is disabled by default but can be enabled by passingthe `-policy argument to the command line utilities or by calling the`X509_VERIFY_PARAM_set1_policies() function.</Note>
</Notes>
<ReleaseDate>2024-02-08</ReleaseDate>
<CVE>CVE-2023-0465</CVE>
<ProductStatuses>
<Status Type="Fixed">
<ProductID>openEuler-22.03-LTS</ProductID>
</Status>
</ProductStatuses>
<Threats>
<Threat Type="Impact">
<Description>Medium</Description>
</Threat>
</Threats>
<CVSSScoreSets>
<ScoreSet>
<BaseScore>5.3</BaseScore>
<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</Vector>
</ScoreSet>
</CVSSScoreSets>
<Remediations>
<Remediation Type="Vendor Fix">
<Description>nodejs security update</Description>
<DATE>2024-02-08</DATE>
<URL>https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1136</URL>
</Remediation>
</Remediations>
</Vulnerability>
</cvrfdoc>