File _patchinfo of Package patchinfo.27998
<patchinfo incident="27998">
<issue tracker="bnc" id="1208487">VUL-0: CVE-2023-23920: nodejs: insecure loading of ICU data through ICU_DATA environment variable</issue>
<issue tracker="bnc" id="1208413">VUL-0: CVE-2023-24807: nodejs: node-undici: ReDoS via `Headers.set()` and `Headers.append()` methods</issue>
<issue tracker="bnc" id="1208481">VUL-0: CVE-2023-23918: nodejs: permissions policies can be bypassed via process.mainModule</issue>
<issue tracker="bnc" id="1205568">openssl-nodejs test failures on 12-SP5</issue>
<issue tracker="bnc" id="1208483">VUL-0: CVE-2023-23919: nodejs: OpenSSL error handling issues in nodejs crypto library</issue>
<issue tracker="bnc" id="1208485">VUL-0: CVE-2023-23936: nodejs: fetch API did not protect against CRLF injection in host headers</issue>
<issue tracker="cve" id="2023-24807"/>
<issue tracker="cve" id="2023-23936"/>
<issue tracker="cve" id="2023-23918"/>
<issue tracker="cve" id="2023-23919"/>
<issue tracker="cve" id="2023-23920"/>
<packager>adamm</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for nodejs16</summary>
<description>This update for nodejs16 fixes the following issues:
Update to LTS version 16.19.1:
- CVE-2023-23918: Fixed permissions policies that could have been bypassed via process.mainModule (bsc#1208481).
- CVE-2023-23919: Fixed OpenSSL error handling issues in nodejs crypto library (bsc#1208483).
- CVE-2023-23920: Fixed insecure loading of ICU data through ICU_DATA environment (bsc#1208487).
- CVE-2023-23936: Fixed protection against CRLF injection in host headers inside fetch API (bsc#1208485).
- CVE-2023-24807: Fixed possible Regular Expression Denial of Service (ReDoS) via Headers.set() and Headers.append() methods (bsc#1208413).
Bug fixes:
- Workaround for failing openssl-nodejs test (bsc#1205568).
</description>
</patchinfo>