Bug 1212581 (CVE-2023-30588)

Summary: VUL-0: CVE-2023-30588: nodejs16,nodejs18: Process interuption due to invalid Public Key information in x509 certificates
Product: [Novell Products] SUSE Security Incidents Reporter: Robert Frohl <rfrohl>
Component: IncidentsAssignee: Adam Majer <amajer>
Status: RESOLVED FIXED QA Contact: Security Team bot <security-team>
Severity: Normal    
Priority: P3 - Medium CC: amajer, stoyan.manolov
Version: unspecifiedFlags: stoyan.manolov: needinfo? (amajer)
Target Milestone: ---   
Hardware: Other   
OS: Other   
URL: https://smash.suse.de/issue/370086/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-30588:5.9:(AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Found By: --- Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---

Description Robert Frohl 2023-06-21 11:51:17 UTC
Process interuption due to invalid Public Key information in x509 certificates (Medium) (CVE-2023-30588)

When an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.

This vulnerability affects all active Node.js versions v16, v18, and, v20.

Thank you, to Marc Schönefeld for reporting this vulnerability and thank you Tobias Nießen for fixing it.

https://nodejs.org/en/blog/vulnerability/june-2023-security-releases
Comment 1 OBSbugzilla Bot 2023-06-21 12:45:15 UTC
This is an autogenerated message for OBS integration:
This bug (1212581) was mentioned in
https://build.opensuse.org/request/show/1094364 Factory / nodejs20
Comment 3 Maintenance Automation 2023-06-27 12:30:48 UTC
SUSE-SU-2023:2655-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs16-16.20.1-8.30.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 4 Maintenance Automation 2023-06-27 20:30:18 UTC
SUSE-SU-2023:2663-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs16-16.20.1-150400.3.21.1
Web and Scripting Module 15-SP4 (src): nodejs16-16.20.1-150400.3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 5 Maintenance Automation 2023-06-27 20:30:21 UTC
SUSE-SU-2023:2662-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
Web and Scripting Module 12 (src): nodejs18-18.16.1-8.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 6 Maintenance Automation 2023-06-28 11:42:48 UTC
SUSE-SU-2023:2669-1: An update that solves 10 vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1208744, 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2022-25881, CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
openSUSE Leap 15.4 (src): nodejs18-18.16.1-150400.9.9.1
openSUSE Leap 15.5 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP4 (src): nodejs18-18.16.1-150400.9.9.1
Web and Scripting Module 15-SP5 (src): nodejs18-18.16.1-150400.9.9.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 7 Maintenance Automation 2023-07-17 16:37:44 UTC
SUSE-SU-2023:2861-1: An update that solves nine vulnerabilities and has one fix can now be installed.

Category: security (important)
Bug References: 1211407, 1211604, 1211605, 1211606, 1211607, 1212574, 1212579, 1212581, 1212582, 1212583
CVE References: CVE-2023-30581, CVE-2023-30585, CVE-2023-30588, CVE-2023-30589, CVE-2023-30590, CVE-2023-31124, CVE-2023-31130, CVE-2023-31147, CVE-2023-32067
Sources used:
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Manager Server 4.2 (src): nodejs16-16.20.1-150300.7.24.2
SUSE Enterprise Storage 7.1 (src): nodejs16-16.20.1-150300.7.24.2

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Carlos López 2024-05-30 18:52:39 UTC
Done, closing.