{"affected":[{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP2-LTSS","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP3-LTSS","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP2-LTSS","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP3-LTSS","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP2","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP3","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"nodejs12":"12.22.12-150200.4.56.1","nodejs12-devel":"12.22.12-150200.4.56.1","nodejs12-docs":"12.22.12-150200.4.56.1","npm12":"12.22.12-150200.4.56.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 7.1","name":"nodejs12","purl":"pkg:rpm/suse/nodejs12&distro=SUSE%20Enterprise%20Storage%207.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"12.22.12-150200.4.56.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for nodejs12 fixes the following issues:\n\nSecurity issues fixed:\n\n* CVE-2023-46809: Node.js is vulnerable to the Marvin Attack (timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding) (bsc#1219997).\n* CVE-2024-22019: http: Reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (bsc#1219993).\n* CVE-2024-22025: Denial of Service by resource exhaustion in fetch() brotli decoding (bsc#1220014).\n* CVE-2024-24806: fix improper domain lookup that potentially leads to SSRF attacks (bsc#1219724).\n","id":"SUSE-SU-2024:0733-1","modified":"2024-02-29T12:02:13Z","published":"2024-02-29T12:02:13Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240733-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219993"},{"type":"REPORT","url":"https://bugzilla.suse.com/1219997"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220014"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220053"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-46809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-22019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-22025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-24806"}],"related":["CVE-2023-46809","CVE-2024-22019","CVE-2024-22025","CVE-2024-24806"],"summary":"Security update for nodejs12","upstream":["CVE-2023-46809","CVE-2024-22019","CVE-2024-22025","CVE-2024-24806"]}