An update is available for nodejs-nodemon, module.nodejs, nodejs, module.nodejs-nodemon, module.nodejs-packaging, nodejs-packaging. This update affects Rocky Linux 9. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. Security Fix(es): * c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) * c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130) * c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147) * c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.src.rpm
nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
nodejs-docs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.noarch.rpm
nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
nodejs-nodemon-0:2.0.20-2.module+el9.2.0+14843+acebbfea.noarch.rpm
nodejs-nodemon-0:2.0.20-2.module+el9.2.0+14843+acebbfea.src.rpm
nodejs-packaging-0:2021.06-4.module+el9.2.0+14843+acebbfea.noarch.rpm
nodejs-packaging-0:2021.06-4.module+el9.2.0+14843+acebbfea.src.rpm
nodejs-packaging-bundler-0:2021.06-4.module+el9.2.0+14843+acebbfea.noarch.rpm
npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.aarch64.rpm
npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.s390x.rpm
npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.x86_64.rpm
No References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31130
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31147
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067
https://bugzilla.redhat.com/show_bug.cgi?id=2209494
https://bugzilla.redhat.com/show_bug.cgi?id=2209497
https://bugzilla.redhat.com/show_bug.cgi?id=2209501
https://bugzilla.redhat.com/show_bug.cgi?id=2209502