Bugzilla – Bug 1208485
VUL-0: CVE-2023-23936: nodejs: fetch API did not protect against CRLF injection in host headers
Last modified: 2024-05-30 18:52:32 UTC
CVE-2023-23936 The fetch API in Node.js did not prevent CRLF injection in the 'host' header potentially allowing attacks such as HTTP response splitting and HTTP header injection. Thank you, to Zhipeng Zhang (@timon8) for reporting this vulnerability and thank you Robert Nagy for fixing it. Impacts: All versions of the 19.x, 18.x and 16.x release lines. References: https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/
This is an autogenerated message for OBS integration: This bug (1208485) was mentioned in https://build.opensuse.org/request/show/1067186 Factory / nodejs19 https://build.opensuse.org/request/show/1067187 Factory / nodejs18
SUSE-SU-2023:0609-1: An update that solves five vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1205568, 1208413, 1208481, 1208483, 1208485, 1208487 CVE References: CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807 Sources used: Web and Scripting Module 12 (src): nodejs16-16.19.1-8.24.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0608-1: An update that solves five vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1205568, 1208413, 1208481, 1208483, 1208485, 1208487 CVE References: CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807 Sources used: openSUSE Leap 15.4 (src): nodejs16-16.19.1-150400.3.15.1 Web and Scripting Module 15-SP4 (src): nodejs16-16.19.1-150400.3.15.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0673-1: An update that solves five vulnerabilities and has one fix can now be installed. Category: security (important) Bug References: 1205568, 1208413, 1208481, 1208483, 1208485, 1208487 CVE References: CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807 Sources used: SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.19.1-150300.7.18.1 SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.19.1-150300.7.18.1 SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.19.1-150300.7.18.1 SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.19.1-150300.7.18.1 SUSE Manager Server 4.2 (src): nodejs16-16.19.1-150300.7.18.1 SUSE Enterprise Storage 7.1 (src): nodejs16-16.19.1-150300.7.18.1 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0715-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1208413, 1208481, 1208483, 1208485, 1208487 CVE References: CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807 Sources used: Web and Scripting Module 12 (src): nodejs18-18.14.2-8.6.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
SUSE-SU-2023:0738-1: An update that solves five vulnerabilities can now be installed. Category: security (important) Bug References: 1208413, 1208481, 1208483, 1208485, 1208487 CVE References: CVE-2023-23918, CVE-2023-23919, CVE-2023-23920, CVE-2023-23936, CVE-2023-24807 Sources used: openSUSE Leap 15.4 (src): nodejs18-18.14.2-150400.9.6.2 Web and Scripting Module 15-SP4 (src): nodejs18-18.14.2-150400.9.6.2 NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Done, closing.