[RLSA-2023:0050] nodejs:14 security, bug fix, and enhancement update
An update is available for nodejs-nodemon, nodejs, nodejs-packaging. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (14.21.1), nodejs-nodemon (2.0.20).
Security Fix(es):
minimist: prototype pollution (CVE-2021-44906)
node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- ID
- RLSA-2023:0050
- Severity
- moderate
- URL
- https://errata.rockylinux.org/RLSA-2023:0050
- Published
-
2023-01-09T14:24:14
(20 months ago) - Modified
-
2023-02-02T13:54:07
(19 months ago) - Rights
- Copyright 2024 Rocky Enterprise Software Foundation
- Other Advisories
-
- ALPINE:CVE-2022-43548
- ALSA-2022:8832
- ALSA-2022:8833
- ALSA-2022:9073
- ALSA-2023:0050
- ALSA-2023:0321
- ALSA-2023:1743
- DSA-5326-1
- ELSA-2022-8832
- ELSA-2022-8833
- ELSA-2023-0050
- ELSA-2023-0321
- ELSA-2023-1743
- FEDORA-2023-18fd476362
- FEDORA-2023-2e38c3756f
- FEDORA-2023-86d75130fe
- FEDORA-2023-a4f0b29f6c
- FEDORA-2023-ce8943223c
- GLSA-202405-29
- MS:CVE-2022-43548
- NPM:GHSA-F8Q6-P94X-37V3
- NPM:GHSA-HRPP-H998-J3PP
- NPM:GHSA-R683-J2X4-V87G
- NPM:GHSA-XVCH-5GV4-984H
- RHSA-2022:8832
- RHSA-2022:8833
- RHSA-2022:9073
- RHSA-2023:0050
- RHSA-2023:0321
- RHSA-2023:1743
- RLSA-2022:8833
- RLSA-2022:9073
- RLSA-2023:0321
- SUSE-SU-2022:1459-1
- SUSE-SU-2022:1461-1
- SUSE-SU-2022:1462-1
- SUSE-SU-2022:1466-1
- SUSE-SU-2022:1694-1
- SUSE-SU-2022:1717-1
- SUSE-SU-2022:2144-1
- SUSE-SU-2022:2146-1
- SUSE-SU-2022:3967-1
- SUSE-SU-2022:3968-1
- SUSE-SU-2022:3989-1
- SUSE-SU-2022:4003-1
- SUSE-SU-2022:4084-1
- SUSE-SU-2022:4254-1
- SUSE-SU-2022:4255-1
- SUSE-SU-2022:4301-1
- SUSE-SU-2023:0408-1
- SUSE-SU-2023:0419-1
- USN-6086-1
- USN-6158-1
- USN-6491-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2021-44906 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44906 | |
CVE | CVE-2022-0235 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0235 | |
CVE | CVE-2022-24999 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24999 | |
CVE | CVE-2022-3517 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3517 | |
CVE | CVE-2022-43548 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43548 | |
Bugzilla | 2044591 | https://bugzilla.redhat.com/show_bug.cgi?id=2044591 | |
Bugzilla | 2066009 | https://bugzilla.redhat.com/show_bug.cgi?id=2066009 | |
Bugzilla | 2134609 | https://bugzilla.redhat.com/show_bug.cgi?id=2134609 | |
Bugzilla | 2140911 | https://bugzilla.redhat.com/show_bug.cgi?id=2140911 | |
Bugzilla | 2142821 | https://bugzilla.redhat.com/show_bug.cgi?id=2142821 | |
Bugzilla | 2150323 | https://bugzilla.redhat.com/show_bug.cgi?id=2150323 | |
Self | RLSA-2023:0050 | https://errata.rockylinux.org/RLSA-2023:0050 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/rockylinux/npm?arch=x86_64&distro=rockylinux-8.7 | rockylinux | npm | < 6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/npm?arch=aarch64&distro=rockylinux-8.7 | rockylinux | npm | < 6.14.17-1.14.21.1.2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-packaging?arch=noarch&distro=rockylinux-8.7 | rockylinux | nodejs-packaging | < 23-3.module+el8.7.0+1071+4bdda2a8 | rockylinux-8.7 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-nodemon?arch=noarch&distro=rockylinux-8.7 | rockylinux | nodejs-nodemon | < 2.0.20-2.module+el8.7.0+1108+49363b0d | rockylinux-8.7 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs-full-i18n | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-full-i18n?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs-full-i18n | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | aarch64 | |
Affected | pkg:rpm/rockylinux/nodejs-docs?arch=noarch&distro=rockylinux-8.7 | rockylinux | nodejs-docs | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | noarch | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=x86_64&distro=rockylinux-8.7 | rockylinux | nodejs-devel | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | x86_64 | |
Affected | pkg:rpm/rockylinux/nodejs-devel?arch=aarch64&distro=rockylinux-8.7 | rockylinux | nodejs-devel | < 14.21.1-2.module+el8.7.0+1116+bd2a84b4 | rockylinux-8.7 | aarch64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |