[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3344-1] nodejs security update

Debian LTS Advisory DLA-3344-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Guilhem Moulin
February 26, 2023                             https://wiki.debian.org/LTS

Package        : nodejs
Version        : 10.24.0~dfsg-1~deb10u3
CVE ID         : CVE-2022-43548 CVE-2023-23920
Debian Bug     : 1023518 1031834

Vulnerabilities have been found in Node.js, which could result in DNS
rebinding or arbitrary code execution.


    The Node.js rebinding protector for `--inspect` still allows invalid
    IP addresses, specifically in octal format, which browsers such as
    Firefox attempt to resolve via DNS.  When combined with an active
    `--inspect` session, such as when using VSCode, an attacker can
    perform DNS rebinding and execute arbitrary code.


    Ben Noordhuis reported that Node.js would search and potentially
    load ICU data when running with elevated privileges.  Node.js now
    builds with `ICU_NO_USER_DATA_OVERRIDE` to avoid this.

For Debian 10 buster, these problems have been fixed in version

We recommend that you upgrade your nodejs packages.

For the detailed security status of nodejs please refer to
its security tracker page at:

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: PGP signature

Reply to: