First published: Wed Apr 12 2023(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>The following packages have been upgraded to a later upstream version: nodejs (14.21.3).<br>Security Fix(es):<br><li> decode-uri-component: improper input validation resulting in DoS (CVE-2022-38900)</li> <li> glob-parent: Regular Expression Denial of Service (CVE-2021-35065)</li> <li> nodejs: Improper handling of URI Subject Alternative Names (CVE-2021-44531)</li> <li> nodejs: Certificate Verification Bypass via String Injection (CVE-2021-44532)</li> <li> nodejs: Incorrect handling of certificate subject and issuer fields (CVE-2021-44533)</li> <li> minimist: prototype pollution (CVE-2021-44906)</li> <li> node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)</li> <li> nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)</li> <li> c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)</li> <li> express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)</li> <li> http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)</li> <li> nodejs: HTTP Request Smuggling due to incorrect parsing of header fields (CVE-2022-35256)</li> <li> nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)</li> <li> Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)</li> <li> nodejs: Prototype pollution via console.table properties (CVE-2022-21824)</li> <li> Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-nodemon | <2.0.20-3.module+el8.6.0+18532+cbe6f646 | 2.0.20-3.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-packaging | <23-3.module+el8.3.0+6519+9f98ed83 | 23-3.module+el8.3.0+6519+9f98ed83 |
redhat/nodejs | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debuginfo | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debugsource | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-devel | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-docs | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-full-i18n | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-nodemon | <2.0.20-3.module+el8.6.0+18532+cbe6f646 | 2.0.20-3.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-packaging | <23-3.module+el8.3.0+6519+9f98ed83 | 23-3.module+el8.3.0+6519+9f98ed83 |
redhat/npm | <6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 | 6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debuginfo | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debugsource | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-devel | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-full-i18n | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/npm | <6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 | 6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debuginfo | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-debugsource | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-devel | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs-full-i18n | <14.21.3-1.module+el8.6.0+18532+cbe6f646 | 14.21.3-1.module+el8.6.0+18532+cbe6f646 |
redhat/npm | <6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 | 6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646 |
redhat/nodejs | <14.21.3-1.module+el8.6.0+18532+cbe6f646.aa | 14.21.3-1.module+el8.6.0+18532+cbe6f646.aa |
redhat/nodejs-debuginfo | <14.21.3-1.module+el8.6.0+18532+cbe6f646.aa | 14.21.3-1.module+el8.6.0+18532+cbe6f646.aa |
redhat/nodejs-debugsource | <14.21.3-1.module+el8.6.0+18532+cbe6f646.aa | 14.21.3-1.module+el8.6.0+18532+cbe6f646.aa |
redhat/nodejs-devel | <14.21.3-1.module+el8.6.0+18532+cbe6f646.aa | 14.21.3-1.module+el8.6.0+18532+cbe6f646.aa |
redhat/nodejs-full-i18n | <14.21.3-1.module+el8.6.0+18532+cbe6f646.aa | 14.21.3-1.module+el8.6.0+18532+cbe6f646.aa |
redhat/npm | <6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.aa | 6.14.18-1.14.21.3.1.module+el8.6.0+18532+cbe6f646.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.