Security update for nodejs24
| Announcement ID: | SUSE-SU-2026:21181-1 |
|---|---|
| Release Date: | 2026-04-13T12:29:51Z |
| Rating: | important |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves nine vulnerabilities can now be installed.
Description:
This update for nodejs24 fixes the following issues:
Update to version 24.14.1.
Security issues fixed:
- CVE-2026-21717: trivially predictable hash collisions due to flaw in V8's string hashing mechanism allows for performance degradation via a crafted request (bsc#1260494).
- CVE-2026-21716: incomplete fix for CVE-2024-36137 allows promise-based FileHandle methods to be used to modify file permissions and ownership on already-open file descriptors (bsc#1260462).
- CVE-2026-21715: flaw in the Permission Model filesystem enforcement allows for file existence disclosure and
filesystem path enumeration via
fs.realpathSync.native()(bsc#1260482). - CVE-2026-21714: memory leak in Node.js HTTP/2 server allows for resource exhaustion via
WINDOW_UPDATEframes sent on stream 0 (bsc#1260480). - CVE-2026-21713: timing side-channel due to flaw in Node.js HMAC verification allows for discovery of HMAC values and potential MAC forgery (bsc#1260463).
- CVE-2026-21712: assertion error caused by flaw in URL processing allows for a process crash via a URL with a malformed IDN (bsc#1260460).
- CVE-2026-21710: uncaught
TypeErrorwhen handling HTTP requests allows for a process crash via requests with a header named__proto__when the application accessesreq.headersDistinct(bsc#1260455). - CVE-2026-21637: flaw in TLS error handling allows for resource exhaustion and crash when
pskCallbackorALPNCallbackare in use (bsc#1256576). - CVE-2025-59464: memory leak allows for remote denial of service against applications processing TLS client certificates (bsc#1256572).
Other updates and bugfixes:
- Version 24.14.0:
- async_hooks: add trackPromises option to createHook()
- build,deps: replace cjs-module-lexer with merve
- deps: add LIEF as a dependency
- events: repurpose events.listenerCount() to accept EventTargets
- fs: add ignore option to fs.watch
- http: add http.setGlobalProxyFromEnv()
- module: allow subpath imports that start with #/
- process: preserve AsyncLocalStorage in queueMicrotask only when needed
- sea: split sea binary manipulation code
- sqlite: enable defensive mode by default
- sqlite: add sqlite prepare options args
- src: add initial support for ESM in embedder API
- stream: add bytes() method to node:stream/consumers
- stream: do not pass readable.compose() output via Readable.from()
- test: use fixture directories for sea tests
- test_runner: add env option to run function
- test_runner: support expecting a test-case to fail
- util: add convertProcessSignalToExitCode utility
- For details, see https://nodejs.org/en/blog/release/v24.14.0
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-541=1 -
SUSE Linux Enterprise Server for SAP applications 16.0
zypper in -t patch SUSE-SLES-16.0-541=1
Package List:
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- nodejs24-debugsource-24.14.1-160000.1.1
- corepack24-24.14.1-160000.1.1
- npm24-24.14.1-160000.1.1
- nodejs24-24.14.1-160000.1.1
- nodejs24-debuginfo-24.14.1-160000.1.1
- nodejs24-devel-24.14.1-160000.1.1
-
SUSE Linux Enterprise Server 16.0 (noarch)
- nodejs24-docs-24.14.1-160000.1.1
-
SUSE Linux Enterprise Server for SAP applications 16.0 (ppc64le x86_64)
- nodejs24-debugsource-24.14.1-160000.1.1
- corepack24-24.14.1-160000.1.1
- npm24-24.14.1-160000.1.1
- nodejs24-24.14.1-160000.1.1
- nodejs24-debuginfo-24.14.1-160000.1.1
- nodejs24-devel-24.14.1-160000.1.1
-
SUSE Linux Enterprise Server for SAP applications 16.0 (noarch)
- nodejs24-docs-24.14.1-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2025-59464.html
- https://www.suse.com/security/cve/CVE-2026-21637.html
- https://www.suse.com/security/cve/CVE-2026-21710.html
- https://www.suse.com/security/cve/CVE-2026-21712.html
- https://www.suse.com/security/cve/CVE-2026-21713.html
- https://www.suse.com/security/cve/CVE-2026-21714.html
- https://www.suse.com/security/cve/CVE-2026-21715.html
- https://www.suse.com/security/cve/CVE-2026-21716.html
- https://www.suse.com/security/cve/CVE-2026-21717.html
- https://bugzilla.suse.com/show_bug.cgi?id=1256572
- https://bugzilla.suse.com/show_bug.cgi?id=1256576
- https://bugzilla.suse.com/show_bug.cgi?id=1260455
- https://bugzilla.suse.com/show_bug.cgi?id=1260460
- https://bugzilla.suse.com/show_bug.cgi?id=1260462
- https://bugzilla.suse.com/show_bug.cgi?id=1260463
- https://bugzilla.suse.com/show_bug.cgi?id=1260480
- https://bugzilla.suse.com/show_bug.cgi?id=1260482
- https://bugzilla.suse.com/show_bug.cgi?id=1260494