- Update to version 20.3.1 (security fixes only). The following
CVEs are fixed in this release:
* (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass
Experimental Policy Mechanism (High)
* (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in
Experimental Permission Model (High)
* (CVE-2023-30587, bsc#1212576): Bypass of Experimental
Permission Model via Node.js Inspector (High)
* (CVE-2023-30582, bsc#1212577): Inadequate Permission Model
Allows Unauthorized File Watching (Medium)
* (CVE-2023-30583, bsc#1212578): Bypass of Experimental
Permission Model via fs.openAsBlob() (Medium)
* (CVE-2023-30585, bsc#1212579): Privilege escalation via
Malicious Registry Key manipulation during Node.js
installer repair process (Medium)
* (CVE-2023-30586, bsc#1212580): Bypass of Experimental
Permission Model via Arbitrary OpenSSL Engines (Medium)
* (CVE-2023-30588, bsc#1212581): Process interuption due to invalid
Public Key information in x509 certificates (Medium)
* (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via
Empty headers separated by CR (Medium)
* (CVE-2023-30590, bsc#1212583): DiffieHellman does not
generate keys after setting a private key (Medium)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs20?expand=0&rev=22
2023-06-21 14:07:38 +02:00
|
|
|
74408b56e0a20601cd073e52f90ffcafeb8d63a4e8deb8583fc3f0d26b502081 node-v20.3.1-aix-ppc64.tar.gz
|
|
|
|
fe48243bff912a26a76a7d5553c6f848a8b738c05ca976738d3a49af5621a584 node-v20.3.1-arm64.msi
|
|
|
|
fabf0d5bde4e1c16b6b96c310115425508c3750cd2b1d2992fa03d52b0050cf1 node-v20.3.1-darwin-arm64.tar.gz
|
|
|
|
5b9ba231a2502f9369295454a80e85468225f2695289ed163870a675eb5ed29f node-v20.3.1-darwin-arm64.tar.xz
|
|
|
|
fd2be29c8e17ef1460a3c67b5fd36ead27159367a8958fae8fe8f3945465e0db node-v20.3.1-darwin-x64.tar.gz
|
|
|
|
37684d83976612774f553e428a1f2610fb7efb270cca32657950c6e2542b250b node-v20.3.1-darwin-x64.tar.xz
|
|
|
|
0e5265e18039399e4e4e013622d5cd5878f3aa9e7d96fc551a74713e0ea447c2 node-v20.3.1-headers.tar.gz
|
|
|
|
c5d8b256a6acd91178342cb4634d0f1652a6aceb32565a72f99c71d69dd22550 node-v20.3.1-headers.tar.xz
|
|
|
|
4785061286dccf43cef673d8f9fec637f7a27d7e4c5b075f393e99ae13089f17 node-v20.3.1-linux-arm64.tar.gz
|
|
|
|
75f820e7e0c460d902eb2c35716d158c06a4692e69f9a6cf2be30a721d7e0b42 node-v20.3.1-linux-arm64.tar.xz
|
|
|
|
f9f8fa6e90e341b2e334589fea5247dfffada4b8ac1eecfb1577b3bbc538f2de node-v20.3.1-linux-armv7l.tar.gz
|
|
|
|
55d405b0ce92fe85a2604c56e92757ba255fff698f7e7d1bc5c9a3f5efcc966c node-v20.3.1-linux-armv7l.tar.xz
|
|
|
|
6e786adcc4bce1d790af579829d29d11a59221c608b760fe5ba2557ee8e3c2c4 node-v20.3.1-linux-ppc64le.tar.gz
|
|
|
|
8463ced01d4aa008be5c699ac4c0f75edac341d6da3bb4c34d5e708bc164e660 node-v20.3.1-linux-ppc64le.tar.xz
|
|
|
|
4fe866b2e8f001d0861a3042d3778189ccbc494dfe7fb1c0b6af9ff8e5086ff4 node-v20.3.1-linux-s390x.tar.gz
|
|
|
|
62737d306d1a3c25b794a362a354092cbce5f04f22f9e8f5cfd61e95aecd487e node-v20.3.1-linux-s390x.tar.xz
|
|
|
|
100507c0c4b4cf2f0661ab8ca79b21790c20a4aae24859e9ab60b7d95fbfd740 node-v20.3.1-linux-x64.tar.gz
|
|
|
|
a9f94435763f9c0128a8b6282ccbeefd0413a96e78e4427cfb7831d150c50334 node-v20.3.1-linux-x64.tar.xz
|
|
|
|
44ef9d3ceac5b7903948923bebc737bd062116a9768e2f620a0ccf034a0fcdf4 node-v20.3.1.pkg
|
|
|
|
785cfbf77998a96949d626f7bc63bc0b8e4737eb5dd2054b2e58d876904f5443 node-v20.3.1.tar.gz
|
|
|
|
12a82db306697959b4389b351a5f97848986b1313f9901b0e0b3d8cf4f3f9991 node-v20.3.1.tar.xz
|
|
|
|
569cb80351832ec3c1e38d61dabbe18d49f18cf20d658845d129c75d67e6e664 node-v20.3.1-win-arm64.7z
|
|
|
|
3ded6baf40440d762928d44df7d05d7c3f0c210a0240b8e5bb65ef3d9ad10edd node-v20.3.1-win-arm64.zip
|
|
|
|
79a85bb3758bfaba66df3abda9e2f29c6ceb65ceedd19d5a5e589c92835b24d5 node-v20.3.1-win-x64.7z
|
|
|
|
b9660cf19136d6cfce9d5ec1bd7b8b7dcc5642fe5fb8c5ddde78dc0aba216dd5 node-v20.3.1-win-x64.zip
|
|
|
|
72657860e268ca1b778a249531cda920800851c252d9f3680201796f45dc76da node-v20.3.1-win-x86.7z
|
|
|
|
69dce73312904b19b4a9b011bccfc47d05b8ebf05b07dcb58246f8d9c7f91e5b node-v20.3.1-win-x86.zip
|
|
|
|
4afe2af88b327173910085d25645e84bf7986d5849db2872b1e304ffd96e295a node-v20.3.1-x64.msi
|
|
|
|
6371129462ec79c6463be74bbd792bbb8071bf333d43fd8aa510d747da670fb4 node-v20.3.1-x86.msi
|
|
|
|
2b1965d736fcdf590c07751948c84b5936d9e09ae2a00d4cd0d307b965437cd9 win-arm64/node.exe
|
2023-06-15 13:44:48 +02:00
|
|
|
7d27551370e78fdf44e4e515458ad33d0c39983985853649fb01368999172662 win-arm64/node.lib
|
- Update to version 20.3.1 (security fixes only). The following
CVEs are fixed in this release:
* (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass
Experimental Policy Mechanism (High)
* (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in
Experimental Permission Model (High)
* (CVE-2023-30587, bsc#1212576): Bypass of Experimental
Permission Model via Node.js Inspector (High)
* (CVE-2023-30582, bsc#1212577): Inadequate Permission Model
Allows Unauthorized File Watching (Medium)
* (CVE-2023-30583, bsc#1212578): Bypass of Experimental
Permission Model via fs.openAsBlob() (Medium)
* (CVE-2023-30585, bsc#1212579): Privilege escalation via
Malicious Registry Key manipulation during Node.js
installer repair process (Medium)
* (CVE-2023-30586, bsc#1212580): Bypass of Experimental
Permission Model via Arbitrary OpenSSL Engines (Medium)
* (CVE-2023-30588, bsc#1212581): Process interuption due to invalid
Public Key information in x509 certificates (Medium)
* (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via
Empty headers separated by CR (Medium)
* (CVE-2023-30590, bsc#1212583): DiffieHellman does not
generate keys after setting a private key (Medium)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs20?expand=0&rev=22
2023-06-21 14:07:38 +02:00
|
|
|
44589d9a922591ea1ec4c4a98f77f99cbeae9928ad26c10ec21d6012afc5a48a win-arm64/node_pdb.7z
|
|
|
|
172e8df848141efa31a92ebbb8a557b314b6d97ada7f73cfd49b5397a2dc978d win-arm64/node_pdb.zip
|
|
|
|
016669a5da40b058c02e4a61a990dec2b4ad4d6fc071eeebdd8d07db4d2601db win-x64/node.exe
|
2023-06-15 13:44:48 +02:00
|
|
|
68a3ed4ccb2780dda353f609ec83ff6d6dc02a399f1dfed6621ae8c1f39a5788 win-x64/node.lib
|
- Update to version 20.3.1 (security fixes only). The following
CVEs are fixed in this release:
* (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass
Experimental Policy Mechanism (High)
* (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in
Experimental Permission Model (High)
* (CVE-2023-30587, bsc#1212576): Bypass of Experimental
Permission Model via Node.js Inspector (High)
* (CVE-2023-30582, bsc#1212577): Inadequate Permission Model
Allows Unauthorized File Watching (Medium)
* (CVE-2023-30583, bsc#1212578): Bypass of Experimental
Permission Model via fs.openAsBlob() (Medium)
* (CVE-2023-30585, bsc#1212579): Privilege escalation via
Malicious Registry Key manipulation during Node.js
installer repair process (Medium)
* (CVE-2023-30586, bsc#1212580): Bypass of Experimental
Permission Model via Arbitrary OpenSSL Engines (Medium)
* (CVE-2023-30588, bsc#1212581): Process interuption due to invalid
Public Key information in x509 certificates (Medium)
* (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via
Empty headers separated by CR (Medium)
* (CVE-2023-30590, bsc#1212583): DiffieHellman does not
generate keys after setting a private key (Medium)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs20?expand=0&rev=22
2023-06-21 14:07:38 +02:00
|
|
|
7c3a5f02900047ef8451ac4cc134803960f80e2373fe187a8567d505f9b8415b win-x64/node_pdb.7z
|
|
|
|
44c07769d543b300f3a59f34e5deb428fa2454da9a55114ed945133cc9a4e702 win-x64/node_pdb.zip
|
|
|
|
38022d2ed2a9cb86998dfbd0e3bb2983e4eabaedbec81949223c2e27a5d4ecc4 win-x86/node.exe
|
2023-06-15 13:44:48 +02:00
|
|
|
13fb4b75d9e6fdf5a708b4dc8ea4ca60b565e4a3235514870e4b369e26fade5f win-x86/node.lib
|
- Update to version 20.3.1 (security fixes only). The following
CVEs are fixed in this release:
* (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass
Experimental Policy Mechanism (High)
* (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in
Experimental Permission Model (High)
* (CVE-2023-30587, bsc#1212576): Bypass of Experimental
Permission Model via Node.js Inspector (High)
* (CVE-2023-30582, bsc#1212577): Inadequate Permission Model
Allows Unauthorized File Watching (Medium)
* (CVE-2023-30583, bsc#1212578): Bypass of Experimental
Permission Model via fs.openAsBlob() (Medium)
* (CVE-2023-30585, bsc#1212579): Privilege escalation via
Malicious Registry Key manipulation during Node.js
installer repair process (Medium)
* (CVE-2023-30586, bsc#1212580): Bypass of Experimental
Permission Model via Arbitrary OpenSSL Engines (Medium)
* (CVE-2023-30588, bsc#1212581): Process interuption due to invalid
Public Key information in x509 certificates (Medium)
* (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via
Empty headers separated by CR (Medium)
* (CVE-2023-30590, bsc#1212583): DiffieHellman does not
generate keys after setting a private key (Medium)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs20?expand=0&rev=22
2023-06-21 14:07:38 +02:00
|
|
|
2c5750f21ca050a0a7d179970b11d2c54458492166905e7748bd2307c19b2771 win-x86/node_pdb.7z
|
|
|
|
834cb5cd72a281f01dc5273bd47818f12d00a5efacc315dc3addaeb91920a2de win-x86/node_pdb.zip
|