- Issued:
- 2023-02-06
- Updated:
- 2023-02-06
RHSA-2023:0612 - Moderate: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
Synopsis
Moderate: rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon security update
Type/Severity
Security Advisory Moderate
Topic
An update for rh-nodejs14-nodejs and rh-nodejs14-nodejs-nodemon is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: rh-nodejs14-nodejs (14.21.1), rh-nodejs14-nodejs-nodemon (2.0.20). (BZ#2129806, BZ#2135519, BZ#2135520, BZ#2141022)
Security Fix(es):
-
glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
-
minimist: prototype pollution (CVE-2021-44906)
-
node-fetch: exposure of sensitive information to an unauthorized actor (CVE-2022-0235)
-
nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)
-
express: "qs" prototype poisoning causes the hang of the node process (CVE-2022-24999)
-
nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- rh-nodejs14-nodejs: Provide full-i18n subpackage (BZ#2009880)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Software Collections (for RHEL Workstation) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server) | 1 | x86_64 |
| Red Hat Software Collections (for RHEL Server for System Z) | 1 | s390x |
| Red Hat Software Collections (for RHEL Server for IBM Power LE) | 1 | ppc64le |
Updated Packages
- rh-nodejs14-npm-6.14.17-14.21.1.3.el7.x86_64.rpm
- rh-nodejs14-nodejs-nodemon-2.0.20-2.el7.src.rpm
- rh-nodejs14-nodejs-14.21.1-3.el7.s390x.rpm
- rh-nodejs14-nodejs-debuginfo-14.21.1-3.el7.s390x.rpm
- rh-nodejs14-nodejs-full-i18n-14.21.1-3.el7.s390x.rpm
- rh-nodejs14-nodejs-devel-14.21.1-3.el7.s390x.rpm
- rh-nodejs14-nodejs-14.21.1-3.el7.x86_64.rpm
- rh-nodejs14-nodejs-debuginfo-14.21.1-3.el7.x86_64.rpm
- rh-nodejs14-nodejs-full-i18n-14.21.1-3.el7.x86_64.rpm
- rh-nodejs14-nodejs-full-i18n-14.21.1-3.el7.ppc64le.rpm
- rh-nodejs14-nodejs-nodemon-2.0.20-2.el7.noarch.rpm
- rh-nodejs14-npm-6.14.17-14.21.1.3.el7.s390x.rpm
- rh-nodejs14-nodejs-devel-14.21.1-3.el7.x86_64.rpm
- rh-nodejs14-nodejs-debuginfo-14.21.1-3.el7.ppc64le.rpm
- rh-nodejs14-nodejs-14.21.1-3.el7.ppc64le.rpm
- rh-nodejs14-npm-6.14.17-14.21.1.3.el7.ppc64le.rpm
- rh-nodejs14-nodejs-14.21.1-3.el7.src.rpm
- rh-nodejs14-nodejs-devel-14.21.1-3.el7.ppc64le.rpm
- rh-nodejs14-nodejs-docs-14.21.1-3.el7.noarch.rpm
Fixes
- This content is not included.BZ - 2009880
- This content is not included.BZ - 2044591
- This content is not included.BZ - 2066009
- This content is not included.BZ - 2129806
- This content is not included.BZ - 2134609
- This content is not included.BZ - 2140911
- This content is not included.BZ - 2150323
- This content is not included.BZ - 2156324
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.