You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: locale/en/blog/vulnerability/february-2023-security-releases.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,11 +21,11 @@ Impacts:
21
21
22
22
* All versions of the 19.x, 18.x, 16.x, and 14.x release lines.
23
23
24
-
## Node.js Permissions policies can be bypassed via process.mainModule (High) ([CVE-2023-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918))
24
+
## Node.js Permissions policies can be bypassed via process.mainModule (High) ([CVE-2023-23918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23918))
25
25
26
-
It was possible to bypass [Permissions](https://nodejs.org/api/permissions.html) and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with --experimental-policy.
26
+
It was possible to bypass [Permissions](https://nodejs.org/api/permissions.html) and access non authorized modules by using process.mainModule.require(). This only affects users who had enabled the experimental permissions option with `--experimental-policy`.
27
27
28
-
Thank you, to [@goums](https://github.com/goums) for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
28
+
Thank you, to [@goums](https://github.com/goums) for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
29
29
30
30
Impacts:
31
31
@@ -35,7 +35,7 @@ Impacts:
35
35
36
36
In some cases Node.js did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.
37
37
38
-
"Thank you, to Morgan Jones and Ryan Dorrity from Viasat Secure Mobile for reporting and discovering this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
38
+
Thank you, to Morgan Jones and Ryan Dorrity from Viasat Secure Mobile for reporting and discovering this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
39
39
40
40
Impacts:
41
41
@@ -56,7 +56,7 @@ Impacts:
56
56
## Regular Expression Denial of Service in Headers in Node.js fetch API(Low) ([CVE-2023-24807](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24807))
57
57
58
58
The Headers.set() and Headers.append() methods in the
59
-
[fetch API](https://nodejs.org/dist/latest/docs/api/globals.html#fetch) in Node.js where vulnerable to Regular a Expression Denial of Service (ReDoS) attacks.
59
+
[fetch API](https://nodejs.org/dist/latest/docs/api/globals.html#fetch) in Node.js were vulnerable to a Regular Expression Denial of Service (ReDoS) attacks.
60
60
61
61
Thank you, to Carter Snook for reporting this vulnerability and thank you Rich Trott for fixing it.
62
62
@@ -67,9 +67,9 @@ Impacts:
67
67
## Node.js insecure loading of ICU data through ICU_DATA environment variable (Low) ([CVE-2023-23920](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23920))
68
68
69
69
Node.js would search and potentially load ICU data when running with elevated priviledges. Node.js
70
-
was modified to build with ICU_NO_USER_DATA_OVERRIDE to avoid this.
70
+
was modified to build with `ICU_NO_USER_DATA_OVERRIDE` to avoid this.
71
71
72
-
Thank you, to Ben Noordhuis for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
72
+
Thank you, to Ben Noordhuis for reporting this vulnerability and thank you [Rafael Gonzaga](https://github.com/RafaelGSS) for fixing it.
0 commit comments