RedHat: RHSA-2023-2654:01 Moderate: nodejs:18 security, bug fix,
Summary
Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version:
nodejs (18.14.2).
Security Fix(es):
* glob-parent: Regular Expression Denial of Service (CVE-2021-35065)
* c-ares: buffer overflow in config_sortlist() due to missing string length
check (CVE-2022-4904)
* http-cache-semantics: Regular Expression Denial of Service (ReDoS)
vulnerability (CVE-2022-25881)
* Node.js: Permissions policies can be bypassed via process.mainModule
(CVE-2023-23918)
* Node.js: OpenSSL error handling issues in nodejs crypto library
(CVE-2023-23919)
* Node.js: Fetch API did not protect against CRLF injection in host headers(CVE-2023-23936)
* Node.js: insecure loading of ICU data through ICU_DATA environment
variable (CVE-2023-23920)
* Node.js: Regular Expression Denial of Service in Headers fetch API
(CVE-2023-24807)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2021-35065 https://access.redhat.com/security/cve/CVE-2022-4904 https://access.redhat.com/security/cve/CVE-2022-25881 https://access.redhat.com/security/cve/CVE-2023-23918 https://access.redhat.com/security/cve/CVE-2023-23919 https://access.redhat.com/security/cve/CVE-2023-23920 https://access.redhat.com/security/cve/CVE-2023-23936 https://access.redhat.com/security/cve/CVE-2023-24807 https://access.redhat.com/security/updates/classification/#moderate
Package List
Red Hat Enterprise Linux AppStream (v. 9):
Source:
nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c.src.rpm
nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c.src.rpm
nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601.src.rpm
aarch64:
nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
nodejs-debuginfo-18.14.2-2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
nodejs-debugsource-18.14.2-2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c.aarch64.rpm
noarch:
nodejs-docs-18.14.2-2.module+el9.2.0.z+18497+a402347c.noarch.rpm
nodejs-nodemon-2.0.20-2.module+el9.2.0.z+18497+a402347c.noarch.rpm
nodejs-packaging-2021.06-4.module+el9.1.0+15718+e52ec601.noarch.rpm
nodejs-packaging-bundler-2021.06-4.module+el9.1.0+15718+e52ec601.noarch.rpm
ppc64le:
nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
nodejs-debuginfo-18.14.2-2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
nodejs-debugsource-18.14.2-2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c.ppc64le.rpm
s390x:
nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c.s390x.rpm
nodejs-debuginfo-18.14.2-2.module+el9.2.0.z+18497+a402347c.s390x.rpm
nodejs-debugsource-18.14.2-2.module+el9.2.0.z+18497+a402347c.s390x.rpm
nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c.s390x.rpm
nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c.s390x.rpm
npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c.s390x.rpm
x86_64:
nodejs-18.14.2-2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
nodejs-debuginfo-18.14.2-2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
nodejs-debugsource-18.14.2-2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
nodejs-devel-18.14.2-2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
nodejs-full-i18n-18.14.2-2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
npm-9.5.0-1.18.14.2.2.module+el9.2.0.z+18497+a402347c.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for the nodejs:18 module is now available for Red Hat EnterpriseLinux 9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Bugs Fixed
2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service
2165824 - CVE-2022-25881 http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability
2168631 - CVE-2022-4904 c-ares: buffer overflow in config_sortlist() due to missing string length check
2171935 - CVE-2023-23918 Node.js: Permissions policies can be bypassed via process.mainModule
2172170 - CVE-2023-23919 Node.js: OpenSSL error handling issues in nodejs crypto library
2172190 - CVE-2023-23936 Node.js: Fetch API did not protect against CRLF injection in host headers2172204 - CVE-2023-24807 Node.js: Regular Expression Denial of Service in Headers fetch API
2172217 - CVE-2023-23920 Node.js: insecure loading of ICU data through ICU_DATA environment variable
2178088 - nodejs:18/nodejs: Rebase to the latest Nodejs 18 release [rhel-9] [rhel-9.2.0.z]