Source: nodejs Version: 18.13.0+dfsg1-1 Severity: grave Tags: security upstream X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>
Hi, The following vulnerabilities were published for nodejs. CVE-2023-39333[0]: | Code injection via WebAssembly export names CVE-2023-38552[1]: | When the Node.js policy feature checks the integrity of a resource | against a trusted manifest, the application can intercept the | operation and return a forged checksum to the node's policy | implementation, thus effectively disabling the integrity check. | Impacts: This vulnerability affects all users using the experimental | policy mechanism in all active release lines: 18.x and, 20.x. Please | note that at the time this CVE was issued, the policy mechanism is | an experimental feature of Node.js. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2023-39333 https://www.cve.org/CVERecord?id=CVE-2023-39333 [1] https://security-tracker.debian.org/tracker/CVE-2023-38552 https://www.cve.org/CVERecord?id=CVE-2023-38552 [2] https://nodejs.org/en/blog/vulnerability/october-2023-security-releases Regards, Salvatore -- Pkg-javascript-devel mailing list Pkg-javascript-devel@alioth-lists.debian.net https://alioth-lists.debian.net/cgi-bin/mailman/listinfo/pkg-javascript-devel