[RHSA-2023:1743] nodejs:14 security, bug fix, and enhancement update
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.3).
Security Fix(es):
decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)
glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2023:1743
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:1743
- Published
-
2023-04-12T00:00:00
(17 months ago) - Modified
-
2023-04-12T00:00:00
(17 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1780
- ALAS2-2024-2399
- ALPINE:CVE-2023-23918
- ALPINE:CVE-2023-23920
- ALSA-2022:8832
- ALSA-2022:8833
- ALSA-2022:9073
- ALSA-2023:0050
- ALSA-2023:0321
- ALSA-2023:1582
- ALSA-2023:1583
- ALSA-2023:1743
- ALSA-2023:2654
- ALSA-2023:2655
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7116
- DSA-5395-1
- DSA-5589-1
- ELSA-2022-8832
- ELSA-2022-8833
- ELSA-2023-0050
- ELSA-2023-0321
- ELSA-2023-1582
- ELSA-2023-1583
- ELSA-2023-1743
- ELSA-2023-2654
- ELSA-2023-2655
- ELSA-2023-4035
- ELSA-2023-6316
- ELSA-2023-6635
- ELSA-2023-7116
- FEDORA-2023-0334c6000a
- FEDORA-2023-18fd476362
- FEDORA-2023-2e38c3756f
- FEDORA-2023-30e81e5293
- FEDORA-2023-496439cbdd
- FEDORA-2023-5c6f32db6f
- FEDORA-2023-86d75130fe
- FEDORA-2023-8d4b772755
- FEDORA-2023-973319d5b7
- FEDORA-2023-a4f0b29f6c
- FEDORA-2023-ae96dd6105
- FEDORA-2023-b121bd62a9
- FEDORA-2023-b86fd9ad80
- FEDORA-2023-ce8943223c
- GLSA-202401-02
- MAVEN:GHSA-RC47-6667-2J5J
- MS:CVE-2023-23918
- NPM:GHSA-CJ88-88MR-972W
- NPM:GHSA-F8Q6-P94X-37V3
- NPM:GHSA-RC47-6667-2J5J
- NPM:GHSA-W573-4HG7-7WGQ
- RHSA-2022:8832
- RHSA-2022:8833
- RHSA-2022:9073
- RHSA-2023:0050
- RHSA-2023:0321
- RHSA-2023:1582
- RHSA-2023:1583
- RHSA-2023:2654
- RHSA-2023:2655
- RHSA-2023:4035
- RHSA-2023:6316
- RHSA-2023:6635
- RHSA-2023:7116
- RLSA-2022:8833
- RLSA-2022:9073
- RLSA-2023:0050
- RLSA-2023:0321
- RLSA-2023:2655
- SUSE-SU-2023:0486-1
- SUSE-SU-2023:0606-1
- SUSE-SU-2023:0607-1
- SUSE-SU-2023:0608-1
- SUSE-SU-2023:0609-1
- SUSE-SU-2023:0673-1
- SUSE-SU-2023:0674-1
- SUSE-SU-2023:0682-1
- SUSE-SU-2023:0715-1
- SUSE-SU-2023:0738-1
- SUSE-SU-2023:1871-1
- SUSE-SU-2023:1872-1
- SUSE-SU-2023:1875-1
- SUSE-SU-2023:1876-1
- SUSE-SU-2023:1923-1
- SUSE-SU-2023:1924-1
- SUSE-SU-2023:1942-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:3420-1
- SUSE-SU-2023:3455-1
- USN-5907-1
- USN-6086-1
- USN-6672-1
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2134609 | https://bugzilla.redhat.com/2134609 | |
Bugzilla | 2156324 | https://bugzilla.redhat.com/2156324 | |
Bugzilla | 2165824 | https://bugzilla.redhat.com/2165824 | |
Bugzilla | 2168631 | https://bugzilla.redhat.com/2168631 | |
Bugzilla | 2170644 | https://bugzilla.redhat.com/2170644 | |
Bugzilla | 2171935 | https://bugzilla.redhat.com/2171935 | |
Bugzilla | 2172217 | https://bugzilla.redhat.com/2172217 | |
RHSA | RHSA-2023:1743 | https://access.redhat.com/errata/RHSA-2023:1743 | |
CVE | CVE-2021-35065 | https://access.redhat.com/security/cve/CVE-2021-35065 | |
CVE | CVE-2022-25881 | https://access.redhat.com/security/cve/CVE-2022-25881 | |
CVE | CVE-2022-3517 | https://access.redhat.com/security/cve/CVE-2022-3517 | |
CVE | CVE-2022-38900 | https://access.redhat.com/security/cve/CVE-2022-38900 | |
CVE | CVE-2022-4904 | https://access.redhat.com/security/cve/CVE-2022-4904 | |
CVE | CVE-2023-23918 | https://access.redhat.com/security/cve/CVE-2023-23918 | |
CVE | CVE-2023-23920 | https://access.redhat.com/security/cve/CVE-2023-23920 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.7 | redhat | npm | < 6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.7 | redhat | npm | < 6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.7 | redhat | npm | < 6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.7 | redhat | npm | < 6.14.18-1.14.21.3.1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.7 | redhat | nodejs | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.7 | redhat | nodejs | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.7 | redhat | nodejs | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.7 | redhat | nodejs | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.3 | redhat | nodejs-packaging | < 23-3.module+el8.3.0+6519+9f98ed83 | redhat-8.3 | ||
Affected | pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.7 | redhat | nodejs-nodemon | < 2.0.20-3.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.7 | redhat | nodejs-full-i18n | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.7 | redhat | nodejs-full-i18n | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.7 | redhat | nodejs-full-i18n | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.7 | redhat | nodejs-full-i18n | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs-docs?distro=redhat-8.7 | redhat | nodejs-docs | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ||
Affected | pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.7 | redhat | nodejs-devel | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.7 | redhat | nodejs-devel | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | s390x | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.7 | redhat | nodejs-devel | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.7 | redhat | nodejs-devel | < 14.21.3-1.module+el8.7.0+18531+81d21ca6 | redhat-8.7 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |