[RHSA-2023:7205] nodejs:20 security update

Severity Important
Affected Packages 20
CVEs 6

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) (CVE-2023-44487)

  • nodejs: permission model improperly protects against path traversal (CVE-2023-39331)

  • nodejs: path traversal through path stored in Uint8Array (CVE-2023-39332)

  • nodejs: integrity checks according to policies can be circumvented (CVE-2023-38552)

  • nodejs: code injection via WebAssembly export names (CVE-2023-39333)

  • node-undici: cookie leakage (CVE-2023-45143)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.9 < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.9 < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.9 < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.9 < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.9 < 2021.06-4.module+el8.9.0+19519+e25b965a
pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-8.9 < 2021.06-4.module+el8.9.0+19519+e25b965a
pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.9 < 3.0.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-docs?distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.9 < 20.8.1-1.module+el8.9.0+20473+c4e3d824
ID
RHSA-2023:7205
Severity
important
URL
https://access.redhat.com/errata/RHSA-2023:7205
Published
2023-11-14T00:00:00
(10 months ago)
Modified
2023-11-14T00:00:00
(10 months ago)
Rights
Copyright 2023 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.9 redhat npm < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 redhat-8.9 x86_64
Affected pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.9 redhat npm < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 redhat-8.9 s390x
Affected pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.9 redhat npm < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.9 redhat npm < 10.1.0-1.20.8.1.1.module+el8.9.0+20473+c4e3d824 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.9 redhat nodejs < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.9 redhat nodejs < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.9 redhat nodejs < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.9 redhat nodejs < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.9 redhat nodejs-packaging < 2021.06-4.module+el8.9.0+19519+e25b965a redhat-8.9
Affected pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-8.9 redhat nodejs-packaging-bundler < 2021.06-4.module+el8.9.0+19519+e25b965a redhat-8.9
Affected pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.9 redhat nodejs-nodemon < 3.0.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.9 redhat nodejs-full-i18n < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.9 redhat nodejs-full-i18n < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.9 redhat nodejs-full-i18n < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.9 redhat nodejs-full-i18n < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs-docs?distro=redhat-8.9 redhat nodejs-docs < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9
Affected pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.9 redhat nodejs-devel < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.9 redhat nodejs-devel < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.9 redhat nodejs-devel < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.9 redhat nodejs-devel < 20.8.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...