Adam Majer
86bbf8af98
CVEs are fixed in this release: * (CVE-2023-30581, bsc#1212574): mainModule.__proto__ Bypass Experimental Policy Mechanism (High) * (CVE-2023-30584, bsc#1212575): Path Traversal Bypass in Experimental Permission Model (High) * (CVE-2023-30587, bsc#1212576): Bypass of Experimental Permission Model via Node.js Inspector (High) * (CVE-2023-30582, bsc#1212577): Inadequate Permission Model Allows Unauthorized File Watching (Medium) * (CVE-2023-30583, bsc#1212578): Bypass of Experimental Permission Model via fs.openAsBlob() (Medium) * (CVE-2023-30585, bsc#1212579): Privilege escalation via Malicious Registry Key manipulation during Node.js installer repair process (Medium) * (CVE-2023-30586, bsc#1212580): Bypass of Experimental Permission Model via Arbitrary OpenSSL Engines (Medium) * (CVE-2023-30588, bsc#1212581): Process interuption due to invalid Public Key information in x509 certificates (Medium) * (CVE-2023-30589, bsc#1212582): HTTP Request Smuggling via Empty headers separated by CR (Medium) * (CVE-2023-30590, bsc#1212583): DiffieHellman does not generate keys after setting a private key (Medium) OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs20?expand=0&rev=22 |
||
---|---|---|
_constraints | ||
.gitattributes | ||
.gitignore | ||
bash_output_helper.bash | ||
cares_public_headers.patch | ||
fix_ci_tests.patch | ||
flaky_test_rerun.patch | ||
gcc13.patch | ||
legacy_python.patch | ||
linker_lto_jobs.patch | ||
manual_configure.patch | ||
node_modules.tar.xz | ||
node-gyp_7.1.2.tar.xz | ||
node-gyp-addon-gypi.patch | ||
node-gyp-config.patch | ||
node-v20.3.1.tar.xz | ||
nodejs20.changes | ||
nodejs20.spec | ||
nodejs-libpath.patch | ||
nodejs.keyring | ||
npm_search_paths.patch | ||
openssl_binary_detection.patch | ||
qemu_timeouts_arches.patch | ||
SHASUMS256.txt | ||
SHASUMS256.txt.sig | ||
skip_no_console.patch | ||
sle12_python3_compat.patch | ||
test-skip-y2038-on-32bit-time_t.patch | ||
update_npm_tarball.sh | ||
versioned.patch | ||
z13.patch |