RLSA-2024:1503

See a problem?
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2024:1503.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2024:1503
Related
Published
2024-03-27T04:35:34.963860Z
Modified
2024-03-27T04:36:49.069892Z
Summary
Important: nodejs:18 security update
Details

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)

  • nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)

  • nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / nodejs-nodemon

Package

Name
nodejs-nodemon
Purl
pkg:rpm/rocky-linux/nodejs-nodemon?distro=rocky-linux-9-x86-64&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:3.0.1-1.module+el9.2.0+15226+de336927

Rocky Linux:9 / nodejs-packaging

Package

Name
nodejs-packaging
Purl
pkg:rpm/rocky-linux/nodejs-packaging?distro=rocky-linux-9-x86-64&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:2021.06-4.module+el9.2.0+15226+de336927