[RHSA-2023:5849] nodejs:18 security update

Severity Important
Affected Packages 20
CVEs 4

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

  • nodejs: integrity checks according to policies can be circumvented (CVE-2023-38552)

  • nodejs: code injection via WebAssembly export names (CVE-2023-39333)

  • node-undici: cookie leakage (CVE-2023-45143)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-9.2 < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/npm?arch=s390x&distro=redhat-9.2 < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-9.2 < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-9.2 < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-packaging?distro=redhat-9.1 < 2021.06-4.module+el9.1.0+15718+e52ec601
pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-9.1 < 2021.06-4.module+el9.1.0+15718+e52ec601
pkg:rpm/redhat/nodejs-nodemon?distro=redhat-9.2 < 3.0.1-1.module+el9.2.0.z+19753+58118bc0
pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-docs?distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-9.2 < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5
ID
RHSA-2023:5849
Severity
important
URL
https://access.redhat.com/errata/RHSA-2023:5849
Published
2023-10-18T00:00:00
(11 months ago)
Modified
2023-10-18T00:00:00
(11 months ago)
Rights
Copyright 2023 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-9.2 redhat npm < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 x86_64
Affected pkg:rpm/redhat/npm?arch=s390x&distro=redhat-9.2 redhat npm < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 s390x
Affected pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-9.2 redhat npm < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 ppc64le
Affected pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-9.2 redhat npm < 9.8.1-1.18.18.2.2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 aarch64
Affected pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-9.2 redhat nodejs < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 x86_64
Affected pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-9.2 redhat nodejs < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 s390x
Affected pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-9.2 redhat nodejs < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 ppc64le
Affected pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-9.2 redhat nodejs < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 aarch64
Affected pkg:rpm/redhat/nodejs-packaging?distro=redhat-9.1 redhat nodejs-packaging < 2021.06-4.module+el9.1.0+15718+e52ec601 redhat-9.1
Affected pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-9.1 redhat nodejs-packaging-bundler < 2021.06-4.module+el9.1.0+15718+e52ec601 redhat-9.1
Affected pkg:rpm/redhat/nodejs-nodemon?distro=redhat-9.2 redhat nodejs-nodemon < 3.0.1-1.module+el9.2.0.z+19753+58118bc0 redhat-9.2
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-9.2 redhat nodejs-full-i18n < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 x86_64
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-9.2 redhat nodejs-full-i18n < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 s390x
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-9.2 redhat nodejs-full-i18n < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 ppc64le
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-9.2 redhat nodejs-full-i18n < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 aarch64
Affected pkg:rpm/redhat/nodejs-docs?distro=redhat-9.2 redhat nodejs-docs < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2
Affected pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-9.2 redhat nodejs-devel < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 x86_64
Affected pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-9.2 redhat nodejs-devel < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 s390x
Affected pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-9.2 redhat nodejs-devel < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 ppc64le
Affected pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-9.2 redhat nodejs-devel < 18.18.2-2.module+el9.2.0.z+20408+7cb5fda5 redhat-9.2 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...