Rocky Linux: RLSA-2023:4537 nodejs
Summary
An update is available for nodejs-packaging, module.nodejs-nodemon, module.nodejs-packaging, nodejs-nodemon. This update affects Rocky Linux 8. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. The package has been upgraded to a later upstream version: nodejs (16.20.1). (BZ#2223678, BZ#2223680, BZ#2223682, BZ#2223684, BZ#2223686, BZ#2223688) Security Fix(es): * nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581) * nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588) * nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589) * nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
RPMs
nodejs-nodemon-0:2.0.20-3.module+el8.7.0+1178+d52dba78.noarch.rpm
nodejs-nodemon-0:2.0.20-3.module+el8.7.0+1178+d52dba78.src.rpm
nodejs-packaging-0:25-1.module+el8.7.0+1108+49363b0d.noarch.rpm
nodejs-packaging-0:25-1.module+el8.7.0+1108+49363b0d.src.rpm
References
No References
CVEs
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30588
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30589
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30590
Fixes
https://bugzilla.redhat.com/show_bug.cgi?id=2219824
https://bugzilla.redhat.com/show_bug.cgi?id=2219838
https://bugzilla.redhat.com/show_bug.cgi?id=2219841
https://bugzilla.redhat.com/show_bug.cgi?id=2219842
https://bugzilla.redhat.com/show_bug.cgi?id=2223678
https://bugzilla.redhat.com/show_bug.cgi?id=2223688