* CVE-2020-8265: use-after-free in TLSWrap (High) bug in TLS
implementation. When writing to a TLS enabled socket,
node::StreamBase::Write calls node::TLSWrap::DoWrite with
a freshly allocated WriteWrap object as first argument.
If the DoWrite method does not return an error, this object is
passed back to the caller as part of a StreamWriteResult structure.
This may be exploited to corrupt memory leading to a
Denial of Service or potentially other exploits (bsc#1180553)
* CVE-2020-8287: HTTP Request Smuggling allow two copies of a
header field in a http request. For example, two Transfer-Encoding
header fields. In this case Node.js identifies the first header
field and ignores the second. This can lead to HTTP Request
Smuggling (https://cwe.mitre.org/data/definitions/444.html).
(bsc#1180554)
* CVE-2020-1971: OpenSSL - EDIPARTYNAME NULL pointer de-reference
(High) This is a vulnerability in OpenSSL which may be exploited
through Node.js. (bsc#1179491)
- Changes in 15.5.0:
* child_process: add signal support to spawn
* http: use autoDestroy: true in incoming message
* lib: support BigInt in querystring.stringify
* stream: support abortsignal in constructor
- npm_search_paths.patch, versioned.patch: refreshed
- revert_cares_caa_reply_support.patch: dropped, no longer needed
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs15?expand=0&rev=14
* dns: add a cancel() method to the promise Resolver
* events: add max listener warning for EventTarget
* http: add support for abortsignal to http.request
* http2: allow setting the local window size of a session
* lib: add throws option to fs.f/l/statSync
* path: add path/posix and path/win32 alias modules
* readline: add getPrompt to get the current prompt
* src: add loop idle time in diagnostic report
* util: add util/types alias module
- New upstream version 15.2.1:
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs15?expand=0&rev=10
* deps: Denial of Service through DNS request (High).
A Node.js application that allows an attacker to trigger a DNS
request for a host of their choice could trigger a Denial of Service
by getting the application to resolve a DNS record with
a larger number of responses (bsc#1178882, CVE-2020-8277)
OBS-URL: https://build.opensuse.org/package/show/devel:languages:nodejs/nodejs15?expand=0&rev=8