<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>52810</bug_id>
          
          <creation_ts>2025-01-24 14:22:48 +0300</creation_ts>
          <short_desc>Обновить node для исправления CVE</short_desc>
          <delta_ts>2025-01-26 17:53:05 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>Branch p11</product>
          <component>node</component>
          <version>unspecified</version>
          <rep_platform>x86_64</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>ASSIGNED</bug_status>
          <resolution></resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P5</priority>
          <bug_severity>normal</bug_severity>
          <target_milestone>---</target_milestone>
          <dependson>52804</dependson>
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vitaly Lipatov">lav</reporter>
          <assigned_to name="Vitaly Lipatov">lav</assigned_to>
          <cc>amakeenk</cc>
          
          <qa_contact name="qa-p11@altlinux.org">qa-p11</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>257989</commentid>
    <comment_count>0</comment_count>
    <who name="Vitaly Lipatov">lav</who>
    <bug_when>2025-01-24 14:22:48 +0300</bug_when>
    <thetext>* Ср янв 22 2025 Vitaly Lipatov &lt;lav@altlinux.ru&gt; 22.13.1-alt1
- fixed CVEs:
 + CVE-2025-23083: src,loader,permission: throw on InternalWorker use when permission model is enabled (High)
 + CVE-2025-23085: src: fix HTTP2 mem leak on premature close and ERR_PROTO (Medium)
 + CVE-2025-23084: path: fix path traversal in normalize() on Windows (Medium)
 + CVE-2025-22150: Use of Insufficiently Random Values in undici fetch() (Medium)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>