[RHSA-2024:2778] nodejs:20 security update

Severity Important
Affected Packages 20
CVEs 5

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • c-ares: Out of bounds read in ares__read_line() (CVE-2024-25629)

  • nghttp2: CONTINUATION frames DoS (CVE-2024-28182)

  • nodejs: using the fetch() function to retrieve content from an untrusted URL leads to denial of service (CVE-2024-22025)

  • nodejs: CONTINUATION frames DoS (CVE-2024-27983)

  • nodejs: HTTP Request Smuggling via Content Length Obfuscation (CVE-2024-27982)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Package Affected Version
pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.9 < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.9 < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.9 < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.9 < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.9 < 2021.06-4.module+el8.9.0+19519+e25b965a
pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-8.9 < 2021.06-4.module+el8.9.0+19519+e25b965a
pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.9 < 3.0.1-1.module+el8.9.0+20473+c4e3d824
pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-docs?distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.9 < 20.12.2-2.module+el8.9.0+21743+0b3f1be2
ID
RHSA-2024:2778
Severity
important
URL
https://access.redhat.com/errata/RHSA-2024:2778
Published
2024-05-09T00:00:00
(4 months ago)
Modified
2024-05-09T00:00:00
(4 months ago)
Rights
Copyright 2024 Red Hat, Inc.
Other Advisories
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:rpm/redhat/npm?arch=x86_64&distro=redhat-8.9 redhat npm < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 x86_64
Affected pkg:rpm/redhat/npm?arch=s390x&distro=redhat-8.9 redhat npm < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 s390x
Affected pkg:rpm/redhat/npm?arch=ppc64le&distro=redhat-8.9 redhat npm < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/npm?arch=aarch64&distro=redhat-8.9 redhat npm < 10.5.0-1.20.12.2.2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs?arch=x86_64&distro=redhat-8.9 redhat nodejs < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs?arch=s390x&distro=redhat-8.9 redhat nodejs < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs?arch=ppc64le&distro=redhat-8.9 redhat nodejs < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs?arch=aarch64&distro=redhat-8.9 redhat nodejs < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs-packaging?distro=redhat-8.9 redhat nodejs-packaging < 2021.06-4.module+el8.9.0+19519+e25b965a redhat-8.9
Affected pkg:rpm/redhat/nodejs-packaging-bundler?distro=redhat-8.9 redhat nodejs-packaging-bundler < 2021.06-4.module+el8.9.0+19519+e25b965a redhat-8.9
Affected pkg:rpm/redhat/nodejs-nodemon?distro=redhat-8.9 redhat nodejs-nodemon < 3.0.1-1.module+el8.9.0+20473+c4e3d824 redhat-8.9
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=x86_64&distro=redhat-8.9 redhat nodejs-full-i18n < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=s390x&distro=redhat-8.9 redhat nodejs-full-i18n < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=ppc64le&distro=redhat-8.9 redhat nodejs-full-i18n < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs-full-i18n?arch=aarch64&distro=redhat-8.9 redhat nodejs-full-i18n < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 aarch64
Affected pkg:rpm/redhat/nodejs-docs?distro=redhat-8.9 redhat nodejs-docs < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9
Affected pkg:rpm/redhat/nodejs-devel?arch=x86_64&distro=redhat-8.9 redhat nodejs-devel < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 x86_64
Affected pkg:rpm/redhat/nodejs-devel?arch=s390x&distro=redhat-8.9 redhat nodejs-devel < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 s390x
Affected pkg:rpm/redhat/nodejs-devel?arch=ppc64le&distro=redhat-8.9 redhat nodejs-devel < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 ppc64le
Affected pkg:rpm/redhat/nodejs-devel?arch=aarch64&distro=redhat-8.9 redhat nodejs-devel < 20.12.2-2.module+el8.9.0+21743+0b3f1be2 redhat-8.9 aarch64
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...