openSUSE Security Update : nodejs (openSUSE-2016-1172)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update brings the new upstream nodejs LTS version 4.6.0, fixing
bugs and security issues :

- Nodejs embedded openssl version update

+ upgrade to 1.0.2j (CVE-2016-6304, CVE-2016-2183,
CVE-2016-2178, CVE-2016-6306, CVE-2016-7052)

+ remove support for dynamic 3rd party engine modules

- http: Properly validate for allowable characters in input
user data. This introduces a new case where throw may occur
when configuring HTTP responses, users should already
be adopting try/catch here.
(CVE-2016-5325, bsc#985201)

- tls: properly validate wildcard certificates
(CVE-2016-7099, bsc#1001652)

- buffer: Zero-fill excess bytes in new Buffer objects
created with Buffer.concat()

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=1001652
https://bugzilla.opensuse.org/show_bug.cgi?id=985201

Solution :

Update the affected nodejs packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)

Family: SuSE Local Security Checks

Nessus Plugin ID: 94002 ()

Bugtraq ID:

CVE ID: CVE-2016-1669
CVE-2016-2178
CVE-2016-2183
CVE-2016-5325
CVE-2016-6304
CVE-2016-6306
CVE-2016-7052
CVE-2016-7099

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now