{"schema_version":"1.7.2","id":"OESA-2024-1173","modified":"2024-02-23T11:06:59Z","published":"2024-02-23T11:06:59Z","upstream":["CVE-2023-44487"],"summary":"nodejs security update","details":"Node.js is an open-source, cross-platform, JavaScript runtime environment, it executes JavaScript code outside of a browser.\r\n\r\nSecurity Fix(es):\r\n\r\nThe HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.(CVE-2023-44487)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP2","name":"nodejs","purl":"pkg:rpm/openEuler/nodejs\u0026distro=openEuler-22.03-LTS-SP2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"12.22.11-9.oe2203sp2"}]}],"ecosystem_specific":{"aarch64":["nodejs-12.22.11-9.oe2203sp2.aarch64.rpm","npm-6.14.16-1.12.22.11.9.oe2203sp2.aarch64.rpm","nodejs-debugsource-12.22.11-9.oe2203sp2.aarch64.rpm","v8-devel-7.8.279.23-1.12.22.11.9.oe2203sp2.aarch64.rpm","nodejs-debuginfo-12.22.11-9.oe2203sp2.aarch64.rpm","nodejs-full-i18n-12.22.11-9.oe2203sp2.aarch64.rpm","nodejs-libs-12.22.11-9.oe2203sp2.aarch64.rpm","nodejs-devel-12.22.11-9.oe2203sp2.aarch64.rpm"],"noarch":["nodejs-docs-12.22.11-9.oe2203sp2.noarch.rpm"],"src":["nodejs-12.22.11-9.oe2203sp2.src.rpm"],"x86_64":["nodejs-full-i18n-12.22.11-9.oe2203sp2.x86_64.rpm","nodejs-devel-12.22.11-9.oe2203sp2.x86_64.rpm","nodejs-debuginfo-12.22.11-9.oe2203sp2.x86_64.rpm","v8-devel-7.8.279.23-1.12.22.11.9.oe2203sp2.x86_64.rpm","npm-6.14.16-1.12.22.11.9.oe2203sp2.x86_64.rpm","nodejs-debugsource-12.22.11-9.oe2203sp2.x86_64.rpm","nodejs-12.22.11-9.oe2203sp2.x86_64.rpm","nodejs-libs-12.22.11-9.oe2203sp2.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2024-1173"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-44487"}],"database_specific":{"severity":"High"}}