Opened 22 months ago
Closed 22 months ago
#19311 closed enhancement (fixed)
node.js-20.11.1
| Reported by: | Bruce Dubbs | Owned by: | Rahul Chandra |
|---|---|---|---|
| Priority: | elevated | Milestone: | 12.1 |
| Component: | BOOK | Version: | git |
| Severity: | normal | Keywords: | |
| Cc: |
Description
New point version.
Change History (4)
comment:1 by , 22 months ago
| Owner: | changed from to |
|---|---|
| Status: | new → assigned |
comment:2 by , 22 months ago
| Priority: | normal → elevated |
|---|
comment:3 by , 22 months ago
comment:4 by , 22 months ago
| Resolution: | → fixed |
|---|---|
| Status: | assigned → closed |
Fixed @ 64a0b9aa9b6d4ae6c5e21928affaa381ffac700e
Issued SA-12.0-102
Note:
See TracTickets
for help on using tickets.

Notable changes This is a security release. Notable changes CVE-2024-21892 - Code injection and privilege escalation through Linux capabilities- (High) CVE-2024-22019 - http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks- (High) CVE-2024-21896 - Path traversal by monkey-patching Buffer internals- (High) CVE-2024-22017 - setuid() does not drop all privileges due to io_uring - (High) CVE-2023-46809 - Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) - (Medium) CVE-2024-21891 - Multiple permission model bypasses due to improper path traversal sequence sanitization - (Medium) CVE-2024-21890 - Improper handling of wildcards in --allow-fs-read and --allow-fs- write (Medium) CVE-2024-22025 - Denial of Service by resource exhaustion in fetch() brotli decoding - (Medium) undici version 5.28.3 libuv version 1.48.0 OpenSSL version 3.0.13+quic1 Commits [7079c062bb] - crypto: disable PKCS#1 padding for privateDecrypt (Michael Dawson) nodejs-private/node-private#525 [186a6e1ffb] - deps: fix GHSA-f74f-cvh7-c6q6/CVE-2024-24806 (Santiago Gimeno) #51737 [686da19abb] - deps: disable io_uring support in libuv by default (Tobias Nießen) nodejs-private/node-private#529 [f7b44bfbce] - deps: update archs files for openssl-3.0.13+quic1 (Node.js GitHub Bot) #51614 [7a30fecea2] - deps: upgrade openssl sources to quictls/openssl-3.0.13+quic1 (Node.js GitHub Bot) #51614 [480fc169a8] - fs: protect against modified Buffer internals in possiblyTransformPath (Tobias Nießen) nodejs-private/node-private#497 [77ac7c3153] - http: add maximum chunk extension size (Paolo Insogna) nodejs- private/node-private#519 [ed7d149675] - lib: use cache fs internals against path traversal (RafaelGSS) nodejs-private/node-private#516 [89bd5fc38f] - lib: update undici to v5.28.3 (Matteo Collina) nodejs-private/node- private#539 [d01dd4291d] - permission: fix wildcard when children > 1 (Rafael Gonzaga) #51209 [40ff37dfcc] - src: fix HasOnly(capability) in node::credentials (Tobias Nießen) nodejs-private/node-private#505 [3f6addd590] - src,deps: disable setuid() etc if io_uring enabled (Tobias Nießen) nodejs-private/node-private#529 [d6da413aa4] - test,doc: clarify wildcard usage (RafaelGSS) nodejs-private/node- private#517 [c213910aea] - zlib: pause stream if outgoing buffer is full (Matteo Collina) nodejs-private/node-private#541In total we're looking at 9 security vulnerabilities, we're already covered by OpenSSL and libuv. CVE-2024-24758 is the CVE for undici.
See https://nodejs.org/en/blog/vulnerability/february-2024-security-releases/ for more information