RLSA-2023:3577
Important: nodejs:18 security update
Topic
An update is available for nodejs-nodemon, module.nodejs, nodejs, module.nodejs-nodemon, module.nodejs-packaging, nodejs-packaging.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Description
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
Security Fix(es):
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067)
* c-ares: Buffer Underwrite in ares_inet_net_pton() (CVE-2023-31130)
* c-ares: Insufficient randomness in generation of DNS query IDs (CVE-2023-31147)
* c-ares: AutoTools does not set CARES_RANDOM_FILE during cross compilation (CVE-2023-31124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Rocky Linux 9
SRPMs
- nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.src.rpm
- nodejs-nodemon-0:2.0.20-2.module+el9.2.0+14843+acebbfea.src.rpm
- nodejs-packaging-0:2021.06-4.module+el9.2.0+14843+acebbfea.src.rpm
RPMs
- nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
- nodejs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
- nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
- nodejs-debuginfo-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
- nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
- nodejs-debugsource-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
- nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
- nodejs-devel-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
- nodejs-docs-1:18.14.2-3.module+el9.2.0+14843+acebbfea.noarch.rpm
- nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.s390x.rpm
- nodejs-full-i18n-1:18.14.2-3.module+el9.2.0+14843+acebbfea.x86_64.rpm
- nodejs-nodemon-0:2.0.20-2.module+el9.2.0+14843+acebbfea.noarch.rpm
- nodejs-packaging-0:2021.06-4.module+el9.2.0+14843+acebbfea.noarch.rpm
- nodejs-packaging-bundler-0:2021.06-4.module+el9.2.0+14843+acebbfea.noarch.rpm
- npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.aarch64.rpm
- npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.ppc64le.rpm
- npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.s390x.rpm
- npm-1:9.5.0-1.18.14.2.3.module+el9.2.0+14843+acebbfea.x86_64.rpm
Issued: 6/24/2023
Type: Security
Severity: Important
Affected Product
- Rocky Linux 9
CVEs
References
- No references