Security update for nodejs24
| Announcement ID: | SUSE-SU-2026:1299-1 |
|---|---|
| Release Date: | 2026-04-13T15:54:46Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for nodejs24 fixes the following issues:
- Update to 24.14.1
- CVE-2026-21637: synchronous exceptions thrown during certain callbacks bypass the standard TLS error handling paths and can cause a denial of service (bsc#1256576).
- CVE-2026-21710: uncaught TypeError exception can cause a denial of service (bsc#1260455).
- CVE-2026-21712: malformed URL format can lead to a crash (bsc#1260460).
- CVE-2026-21713: timing side-channel in HMAC verification via memcmp can lead to potential MAC forgery (bsc#1260463).
- CVE-2026-21714: WINDOW_UPDATE frames on stream 0 can lead to memory leak (bsc#1260480).
- CVE-2026-21715: permission model bypass in realpathSync.native can allow file existence disclosure (bsc#1260482).
- CVE-2026-21716: promise-based FileHandle methods can be used to modify file permissions and ownership (bsc#1260462).
- CVE-2026-21717: crafted request can lead to trivially predictable hash collisions (bsc#1260494).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
Web and Scripting Module 15-SP7
zypper in -t patch SUSE-SLE-Module-Web-Scripting-15-SP7-2026-1299=1
Package List:
-
Web and Scripting Module 15-SP7 (aarch64 ppc64le s390x x86_64)
- npm24-24.14.1-150700.15.8.1
- nodejs24-debuginfo-24.14.1-150700.15.8.1
- nodejs24-24.14.1-150700.15.8.1
- nodejs24-debugsource-24.14.1-150700.15.8.1
- nodejs24-devel-24.14.1-150700.15.8.1
-
Web and Scripting Module 15-SP7 (noarch)
- nodejs24-docs-24.14.1-150700.15.8.1
References:
- https://www.suse.com/security/cve/CVE-2025-59464.html
- https://www.suse.com/security/cve/CVE-2026-21637.html
- https://www.suse.com/security/cve/CVE-2026-21710.html
- https://www.suse.com/security/cve/CVE-2026-21712.html
- https://www.suse.com/security/cve/CVE-2026-21713.html
- https://www.suse.com/security/cve/CVE-2026-21714.html
- https://www.suse.com/security/cve/CVE-2026-21715.html
- https://www.suse.com/security/cve/CVE-2026-21716.html
- https://www.suse.com/security/cve/CVE-2026-21717.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256572
- https://bugzilla.suse.com/show_bug.cgi?id=1256576
- https://bugzilla.suse.com/show_bug.cgi?id=1260455
- https://bugzilla.suse.com/show_bug.cgi?id=1260460
- https://bugzilla.suse.com/show_bug.cgi?id=1260462
- https://bugzilla.suse.com/show_bug.cgi?id=1260463
- https://bugzilla.suse.com/show_bug.cgi?id=1260480
- https://bugzilla.suse.com/show_bug.cgi?id=1260482
- https://bugzilla.suse.com/show_bug.cgi?id=1260494