RLSA-2024:1688

Source
https://errata.rockylinux.org/RLSA-2024:1688
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:1688.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:1688
Related
Published
2024-05-06T13:05:29.743628Z
Modified
2024-05-06T13:06:54.917818Z
Summary
Important: nodejs:20 security update
Details

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)

  • nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)

  • nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)

  • nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)

  • nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)

  • nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)

  • nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / nodejs-nodemon

Package

Name
nodejs-nodemon
Purl
pkg:rpm/rocky-linux/nodejs-nodemon?distro=rocky-linux-9-x86-64&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:3.0.1-1.module+el9.2.0+15226+de336927

Rocky Linux:9 / nodejs-packaging

Package

Name
nodejs-packaging
Purl
pkg:rpm/rocky-linux/nodejs-packaging?distro=rocky-linux-9-x86-64&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2021.06-4.module+el9.2.0+15226+de336927