SUSE-SU-2016:2470-1

Source
https://www.suse.com/support/update/announcement/2016/suse-su-20162470-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2016:2470-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2016:2470-1
Related
Published
2016-10-06T14:39:43Z
Modified
2016-10-06T14:39:43Z
Summary
Security update for nodejs4
Details

This update brings the new upstream nodejs LTS version 4.6.0, fixing bugs and security issues:

  • Nodejs embedded openssl version update
    • upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183, CVE-2016-2178, CVE-2016-6306, CVE-2016-7052)
    • remove support for dynamic 3rd party engine modules
  • http: Properly validate for allowable characters in input user data. This introduces a new case where throw may occur when configuring HTTP responses, users should already be adopting try/catch here. (CVE-2016-5325, bsc#985201)
  • tls: properly validate wildcard certificates (CVE-2016-7099, bsc#1001652)
  • buffer: Zero-fill excess bytes in new Buffer objects created with Buffer.concat()
References

Affected packages

SUSE:Linux Enterprise Module for Web and Scripting 12 / nodejs4

Package

Name
nodejs4
Purl
purl:rpm/suse/nodejs4&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Web%20and%20Scripting%2012

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.0-8.1

Ecosystem specific

{
    "binaries": [
        {
            "nodejs4-docs": "4.6.0-8.1",
            "nodejs4-devel": "4.6.0-8.1",
            "nodejs4": "4.6.0-8.1",
            "npm4": "4.6.0-8.1"
        }
    ]
}