vulnerability
Oracle Linux: CVE-2023-30590: ELSA-2023-12933: GraalVM Security update (IMPORTANT) (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | Jun 20, 2023 | May 21, 2024 | Dec 3, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Jun 20, 2023
Added
May 21, 2024
Modified
Dec 3, 2025
Description
The generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet, but the function is also needed to compute the corresponding public key after calling setPrivateKey(). However, the documentation says this API call: "Generates private and public Diffie-Hellman key values".
The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.
A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.
The documented behavior is very different from the actual behavior, and this difference could easily lead to security issues in applications that use these APIs as the DiffieHellman may be used as the basis for application-level security, implications are consequently broad.
A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.
Solutions
oracle-linux-upgrade-graalvm-community-17-espressooracle-linux-upgrade-graalvm-community-17-espresso-llvmoracle-linux-upgrade-graalvm-community-17-icu4joracle-linux-upgrade-graalvm-community-17-javascriptoracle-linux-upgrade-graalvm-community-17-jdkoracle-linux-upgrade-graalvm-community-17-libpolyglotoracle-linux-upgrade-graalvm-community-17-llvmoracle-linux-upgrade-graalvm-community-17-llvm-toolchainoracle-linux-upgrade-graalvm-community-17-native-imageoracle-linux-upgrade-graalvm-community-17-native-image-llvm-backendoracle-linux-upgrade-graalvm-community-17-nodejsoracle-linux-upgrade-graalvm-community-17-nodejs-develoracle-linux-upgrade-graalvm-community-17-polyglotoracle-linux-upgrade-graalvm-community-17-pythonoracle-linux-upgrade-graalvm-community-17-python-develoracle-linux-upgrade-graalvm-community-17-regexoracle-linux-upgrade-graalvm-community-17-rubyoracle-linux-upgrade-graalvm-community-17-ruby-develoracle-linux-upgrade-graalvm-community-17-toolsoracle-linux-upgrade-graalvm-community-17-wasmoracle-linux-upgrade-graalvm-community-21-jdkoracle-linux-upgrade-graalvm-community-21-native-imageoracle-linux-upgrade-nodejsoracle-linux-upgrade-nodejs-develoracle-linux-upgrade-nodejs-docsoracle-linux-upgrade-nodejs-full-i18noracle-linux-upgrade-nodejs-libsoracle-linux-upgrade-nodejs-nodemonoracle-linux-upgrade-nodejs-packagingoracle-linux-upgrade-nodejs-packaging-bundleroracle-linux-upgrade-npm
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.