- Issued:
- 2024-04-08
- Updated:
- 2024-04-08
RHSA-2024:1688 - Important: nodejs:20 security update
Synopsis
Important: nodejs:20 security update
Type/Severity
Security Advisory Important
Topic
An update for the nodejs:20 module is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
-
nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)
-
nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)
-
nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)
-
nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)
-
nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)
-
nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)
-
nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 | 9 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 9.4 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.6 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Life Cycle | 9.4 | x86_64 |
| Red Hat Enterprise Linux for Power, little endian | 9 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support | 9.4 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.6 | ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Life Cycle | 9.4 | ppc64le |
| Red Hat Enterprise Linux for IBM z Systems | 9 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Life Cycle | 9.4 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.6 | s390x |
| Red Hat Enterprise Linux for IBM z Systems - 4 years of updates | 9.4 | s390x |
| Red Hat Enterprise Linux for ARM 64 | 9 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Update Support | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - Extended Life Cycle | 9.4 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.6 | aarch64 |
| Red Hat Enterprise Linux for ARM 64 - 4 years of updates | 9.4 | aarch64 |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.6 | ppc64le |
| Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | 9.4 | ppc64le |
| Red Hat Enterprise Linux Server - AUS | 9.6 | x86_64 |
| Red Hat Enterprise Linux Server - AUS | 9.4 | x86_64 |
Updated Packages
- nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d.noarch.rpm
- nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781.src.rpm
- nodejs-packaging-2021.06-4.module+el9.3.0+19518+63aad52d.src.rpm
- nodejs-packaging-bundler-2021.06-4.module+el9.3.0+19518+63aad52d.noarch.rpm
- npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-docs-20.11.1-1.module+el9.3.0+21385+bac43d5a.noarch.rpm
- nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.src.rpm
- nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.ppc64le.rpm
- nodejs-nodemon-3.0.1-1.module+el9.3.0.z+20478+84a9f781.noarch.rpm
- nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.s390x.rpm
- npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.x86_64.rpm
- nodejs-debuginfo-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
- nodejs-full-i18n-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
- nodejs-devel-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
- nodejs-debugsource-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
- nodejs-20.11.1-1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
- npm-10.2.4-1.20.11.1.1.module+el9.3.0+21385+bac43d5a.aarch64.rpm
Fixes
- This content is not included.BZ - 2264569
- This content is not included.BZ - 2264574
- This content is not included.BZ - 2264582
- This content is not included.BZ - 2265717
- This content is not included.BZ - 2265720
- This content is not included.BZ - 2265722
- This content is not included.BZ - 2265727
CVEs
- CVE-2023-46809
- CVE-2024-21890
- CVE-2024-21891
- CVE-2024-21892
- CVE-2024-21896
- CVE-2024-22017
- CVE-2024-22019
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.