[RHSA-2023:3577] nodejs:18 security update
Severity
Important
Affected Packages
20
CVEs
4
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RHSA-2023:3577
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2023:3577
- Published
-
2023-06-14T00:00:00
(15 months ago) - Modified
-
2023-06-14T00:00:00
(15 months ago) - Rights
- Copyright 2023 Red Hat, Inc.
- Other Advisories
-
- ALAS-2023-1770
- ALAS2-2023-2127
- ALAS2-2024-2399
- ALAS2-2024-2429
- ALSA-2023:3559
- ALSA-2023:3577
- ALSA-2023:3584
- ALSA-2023:3586
- ALSA-2023:4034
- ALSA-2023:4035
- ALSA-2023:6635
- ALSA-2023:7207
- DSA-5419-1
- ELSA-2023-3559
- ELSA-2023-3577
- ELSA-2023-3584
- ELSA-2023-3586
- ELSA-2023-3741
- ELSA-2023-4034
- ELSA-2023-4035
- ELSA-2023-6635
- ELSA-2023-7207
- FEDORA-2023-520848815b
- FEDORA-2023-ae97529c00
- GLSA-202310-09
- MS:CVE-2023-31124
- RHSA-2023:3559
- RHSA-2023:3584
- RHSA-2023:3586
- RHSA-2023:3741
- RHSA-2023:4034
- RHSA-2023:4035
- RHSA-2023:6635
- RHSA-2023:7207
- RLSA-2023:3559
- RLSA-2023:3584
- RLSA-2023:7207
- SSA:2023-142-01
- SUSE-SU-2023:2313-1
- SUSE-SU-2023:2477-1
- SUSE-SU-2023:2655-1
- SUSE-SU-2023:2662-1
- SUSE-SU-2023:2663-1
- SUSE-SU-2023:2669-1
- SUSE-SU-2023:2861-1
- USN-6164-1
- USN-6164-2
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 2209494 | https://bugzilla.redhat.com/2209494 | |
Bugzilla | 2209497 | https://bugzilla.redhat.com/2209497 | |
Bugzilla | 2209501 | https://bugzilla.redhat.com/2209501 | |
Bugzilla | 2209502 | https://bugzilla.redhat.com/2209502 | |
RHSA | RHSA-2023:3577 | https://access.redhat.com/errata/RHSA-2023:3577 | |
CVE | CVE-2023-31124 | https://access.redhat.com/security/cve/CVE-2023-31124 | |
CVE | CVE-2023-31130 | https://access.redhat.com/security/cve/CVE-2023-31130 | |
CVE | CVE-2023-31147 | https://access.redhat.com/security/cve/CVE-2023-31147 | |
CVE | CVE-2023-32067 | https://access.redhat.com/security/cve/CVE-2023-32067 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-9.2 | redhat | npm | < 9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/npm?arch=s390x&distro=redhat-9.2 | redhat | npm | < 9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-9.2 | redhat | npm | < 9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-9.2 | redhat | npm | < 9.5.0-1.18.14.2.3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-9.2 | redhat | nodejs | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-9.2 | redhat | nodejs | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-9.2 | redhat | nodejs | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-9.2 | redhat | nodejs | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs-packaging?distro=redhat-9.1 | redhat | nodejs-packaging | < 2021.06-4.module+el9.1.0+15718+e52ec601 | redhat-9.1 | ||
Affected | pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-9.1 | redhat | nodejs-packaging-bundler | < 2021.06-4.module+el9.1.0+15718+e52ec601 | redhat-9.1 | ||
Affected | pkg:rpm/redhat/nodejs-nodemon?distro=redhat-9.2 | redhat | nodejs-nodemon | < 2.0.20-2.module+el9.2.0.z+18497+a402347c | redhat-9.2 | ||
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-9.2 | redhat | nodejs-full-i18n | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-9.2 | redhat | nodejs-full-i18n | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-9.2 | redhat | nodejs-full-i18n | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-9.2 | redhat | nodejs-full-i18n | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | aarch64 | |
Affected | pkg:rpm/redhat/nodejs-docs?distro=redhat-9.2 | redhat | nodejs-docs | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | ||
Affected | pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-9.2 | redhat | nodejs-devel | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | x86_64 | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-9.2 | redhat | nodejs-devel | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | s390x | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-9.2 | redhat | nodejs-devel | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | ppc64le | |
Affected | pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-9.2 | redhat | nodejs-devel | < 18.14.2-3.module+el9.2.0.z+18964+42696395 | redhat-9.2 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |