Information Exposure Affecting nodejs16 package, versions <16.17.0-150300.7.9.1


Severity

Recommended
0.0
medium
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.26% (65th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-SLES153-NODEJS16-3021689
  • published13 Sept 2022
  • disclosed12 Sept 2022

Introduced: 12 Sep 2022

CVE-2022-29244  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade SLES:15.3 nodejs16 to version 16.17.0-150300.7.9.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nodejs16 package and not the nodejs16 package as distributed by SLES. See How to fix? for SLES:15.3 relevant fixed versions and status.

npm pack ignores root-level .gitignore and .npmignore file exclusion directives when run in a workspace or with a workspace flag (ie. --workspaces, --workspace=&lt;name&gt;). Anyone who has run npm pack or npm publish inside a workspace, as of v7.9.0 and v7.13.0 respectively, may be affected and have published files into the npm registry they did not intend to include. Users should upgrade to the latest, patched version of npm v8.11.0, run: npm i -g npm@latest . Node.js versions v16.15.1, v17.19.1, and v18.3.0 include the patched v8.11.0 version of npm.

CVSS Scores

version 3.1