First published: Wed Jul 12 2023(Updated: )
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. <br>Security Fix(es):<br><li> c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)</li> <li> c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)</li> <li> c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)</li> <li> c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)</li> <li> c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-nodemon | <2.0.20-2.module+el8.8.0+18432+27f188ac | 2.0.20-2.module+el8.8.0+18432+27f188ac |
redhat/nodejs-packaging | <2021.06-4.module+el8.7.0+15582+19c314fa | 2021.06-4.module+el8.7.0+15582+19c314fa |
redhat/nodejs-docs | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-nodemon | <2.0.20-2.module+el8.8.0+18432+27f188ac | 2.0.20-2.module+el8.8.0+18432+27f188ac |
redhat/nodejs-packaging | <2021.06-4.module+el8.7.0+15582+19c314fa | 2021.06-4.module+el8.7.0+15582+19c314fa |
redhat/nodejs-packaging-bundler | <2021.06-4.module+el8.7.0+15582+19c314fa | 2021.06-4.module+el8.7.0+15582+19c314fa |
redhat/nodejs | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debuginfo | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debugsource | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-devel | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-full-i18n | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/npm | <9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc | 9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debuginfo | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debugsource | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-devel | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-full-i18n | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/npm | <9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc | 9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debuginfo | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-debugsource | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-devel | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs-full-i18n | <18.14.2-3.module+el8.8.0+19021+4b8b11cc | 18.14.2-3.module+el8.8.0+19021+4b8b11cc |
redhat/npm | <9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc | 9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc |
redhat/nodejs | <18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa | 18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa |
redhat/nodejs-debuginfo | <18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa | 18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa |
redhat/nodejs-debugsource | <18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa | 18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa |
redhat/nodejs-devel | <18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa | 18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa |
redhat/nodejs-full-i18n | <18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa | 18.14.2-3.module+el8.8.0+19021+4b8b11cc.aa |
redhat/npm | <9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc.aa | 9.5.0-1.18.14.2.3.module+el8.8.0+19021+4b8b11cc.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:4035 is classified as critical due to the vulnerabilities affecting the Node.js platform.
To fix RHSA-2023:4035, you should update affected packages to the specified patched versions, such as nodejs 18.14.2-3.module+el8.8.0+19021+4b8b11cc.
RHSA-2023:4035 addresses a denial of service issue (CVE-2023-32067) and a buffer overflow in c-ares.
RHSA-2023:4035 affects multiple Node.js related packages, including nodejs, nodejs-nodemon, and npm among others.
Yes, RHSA-2023:4035 includes a vulnerability that could lead to a denial of service attack.