Issued:
2024-04-08
Updated:
2024-04-08

RHSA-2024:1688 - Important: nodejs:20 security update


Synopsis

Important: nodejs:20 security update

Type/Severity

Security Advisory Important

Topic

An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)

  • nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)

  • nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)

  • nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)

  • nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)

  • nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)

  • nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

ProductVersionArch
Red Hat Enterprise Linux for x86_649x86_64
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions9.6x86_64
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions9.4x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support9.6x86_64
Red Hat Enterprise Linux for x86_64 - Extended Update Support9.4x86_64
Red Hat Enterprise Linux for x86_64 - Extended Life Cycle9.6x86_64
Red Hat Enterprise Linux for x86_64 - Extended Life Cycle9.4x86_64
Red Hat Enterprise Linux for Power, little endian9ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support9.6ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support9.4ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle9.6ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle9.4ppc64le
Red Hat Enterprise Linux for IBM z Systems9s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support9.6s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support9.4s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle9.6s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle9.4s390x
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates9.6s390x
Red Hat Enterprise Linux for IBM z Systems - 4 years of updates9.4s390x
Red Hat Enterprise Linux for ARM 649aarch64
Red Hat Enterprise Linux for ARM 64 - Extended Update Support9.6aarch64
Red Hat Enterprise Linux for ARM 64 - Extended Update Support9.4aarch64
Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle9.6aarch64
Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle9.4aarch64
Red Hat Enterprise Linux for ARM 64 - 4 years of updates9.6aarch64
Red Hat Enterprise Linux for ARM 64 - 4 years of updates9.4aarch64
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions9.6ppc64le
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions9.4ppc64le
Red Hat Enterprise Linux Server - AUS9.6x86_64
Red Hat Enterprise Linux Server - AUS9.4x86_64

Updated Packages

  • nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d.noarch.rpm
  • nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781.src.rpm
  • nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d.src.rpm
  • nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d.noarch.rpm
  • npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a.noarch.rpm
  • nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.src.rpm
  • nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
  • nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch.rpm
  • nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
  • npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
  • nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
  • nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
  • nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
  • nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
  • nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
  • npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.aarch64.rpm

Fixes

CVEs

References


Additional information