{"id":"CVE-2023-23919","details":"A cryptographic vulnerability exists in Node.js \u003c19.2.0, \u003c18.14.1, \u003c16.19.1, \u003c14.21.3 that in some cases did does not clear the OpenSSL error stack after operations that may set it. This may lead to false positive errors during subsequent cryptographic operations that happen to be on the same thread. This in turn could be used to cause a denial of service.","aliases":["BIT-node-2023-23919","BIT-node-min-2023-23919"],"modified":"2026-04-10T04:55:44.540755Z","published":"2023-02-23T20:15:13.977Z","related":["ALSA-2023:1582","ALSA-2023:2654","SUSE-SU-2023:0608-1","SUSE-SU-2023:0609-1","SUSE-SU-2023:0673-1","SUSE-SU-2023:0715-1","SUSE-SU-2023:0738-1","openSUSE-SU-2024:12725-1","openSUSE-SU-2024:12726-1"],"references":[{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230316-0008/"},{"type":"FIX","url":"https://nodejs.org/en/blog/vulnerability/february-2023-security-releases/"},{"type":"EVIDENCE","url":"https://hackerone.com/reports/1808596"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nodejs/node","events":[{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"last_affected":"354b6a93bd1d66f1833489d6fe01a2b0e8f6aff9"},{"introduced":"73aa21658dfa6a22c06451d080152b32b1f98dbe"},{"fixed":"edd64fe5ba20c6c2f53720c672c591f09d9d4ac0"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"last_affected":"49415500bb1bf51a1fade5ea2d03f3988ecabc25"},{"introduced":"7162e686b18d22b4385fa5c04274fb04dbd810c7"},{"fixed":"96a4559f259f109a2abc480caeba12644b8a8fd1"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"last_affected":"8c1dd95f3cc5d91acb9ce8994b3ac45ab927178f"},{"introduced":"49a77a5a996a49e8cb728eed42e55a7c1a9eef6e"},{"fixed":"7bc2cf7fa9a2016fadb27e042968a69297bd975e"},{"introduced":"cc993fb2760d01457955f5b9ff787d559ed1c34e"},{"fixed":"8a4d7ac6b50ff425b22a0a0a2ad7ec0ae9f31587"}],"database_specific":{"versions":[{"introduced":"14.0.0"},{"last_affected":"14.14.0"},{"introduced":"14.0.0"},{"fixed":"14.21.3"},{"introduced":"16.0.0"},{"last_affected":"16.12.0"},{"introduced":"16.0.0"},{"fixed":"16.19.1"},{"introduced":"18.0.0"},{"last_affected":"18.11.0"},{"introduced":"18.0.0"},{"fixed":"18.14.1"},{"introduced":"19.0.0"},{"fixed":"19.2.0"}]}}],"versions":["v14.0.0","v14.1.0","v14.10.0","v14.10.1","v14.11.0","v14.12.0","v14.13.0","v14.13.1","v14.14.0","v14.15.0","v14.15.1","v14.15.2","v14.15.3","v14.15.4","v14.15.5","v14.16.0","v14.16.1","v14.17.0","v14.17.1","v14.17.2","v14.17.3","v14.17.4","v14.17.5","v14.17.6","v14.18.0","v14.18.1","v14.18.2","v14.18.3","v14.19.0","v14.19.1","v14.19.2","v14.19.3","v14.2.0","v14.20.0","v14.20.1","v14.21.0","v14.21.1","v14.21.2","v14.3.0","v14.4.0","v14.5.0","v14.6.0","v14.7.0","v14.8.0","v14.9.0","v16.0.0","v16.1.0","v16.10.0","v16.11.0","v16.11.1","v16.12.0","v16.13.0","v16.13.1","v16.13.2","v16.14.0","v16.14.1","v16.14.2","v16.15.0","v16.15.1","v16.16.0","v16.17.0","v16.17.1","v16.18.0","v16.18.1","v16.19.0","v16.2.0","v16.3.0","v16.4.0","v16.4.1","v16.4.2","v16.5.0","v16.6.0","v16.6.1","v16.6.2","v16.7.0","v16.8.0","v16.9.0","v16.9.1","v18.0.0","v18.1.0","v18.10.0","v18.11.0","v18.12.0","v18.12.1","v18.13.0","v18.14.0","v18.2.0","v18.3.0","v18.4.0","v18.5.0","v18.6.0","v18.7.0","v18.8.0","v18.9.0","v18.9.1","v19.0.0","v19.0.1","v19.1.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-23919.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}