8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
49.9%
An update is available for nodejs, nodejs-nodemon.
This update affects Rocky Linux 9.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16.19.1), nodejs-nodemon (2.0.20).
Security Fix(es):
c-ares: buffer overflow in config_sortlist() due to missing string length check (CVE-2022-4904)
http-cache-semantics: Regular Expression Denial of Service (ReDoS) vulnerability (CVE-2022-25881)
Node.js: Permissions policies can be bypassed via process.mainModule (CVE-2023-23918)
Node.js: Fetch API did not protect against CRLF injection in host headers (CVE-2023-23936)
Node.js: insecure loading of ICU data through ICU_DATA environment variable (CVE-2023-23920)
Node.js: Regular Expression Denial of Service in Headers fetch API (CVE-2023-24807)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
rocky | 9 | aarch64 | nodejs | < 16.19.1-1.el9_2 | nodejs-1:16.19.1-1.el9_2.aarch64.rpm |
rocky | 9 | s390x | nodejs | < 16.19.1-1.el9_2 | nodejs-1:16.19.1-1.el9_2.s390x.rpm |
rocky | 9 | aarch64 | nodejs-debuginfo | < 16.19.1-1.el9_2 | nodejs-debuginfo-1:16.19.1-1.el9_2.aarch64.rpm |
rocky | 9 | s390x | nodejs-debuginfo | < 16.19.1-1.el9_2 | nodejs-debuginfo-1:16.19.1-1.el9_2.s390x.rpm |
rocky | 9 | aarch64 | nodejs-debugsource | < 16.19.1-1.el9_2 | nodejs-debugsource-1:16.19.1-1.el9_2.aarch64.rpm |
rocky | 9 | s390x | nodejs-debugsource | < 16.19.1-1.el9_2 | nodejs-debugsource-1:16.19.1-1.el9_2.s390x.rpm |
rocky | 9 | noarch | nodejs-docs | < 16.19.1-1.el9_2 | nodejs-docs-1:16.19.1-1.el9_2.noarch.rpm |
rocky | 9 | aarch64 | nodejs-full-i18n | < 16.19.1-1.el9_2 | nodejs-full-i18n-1:16.19.1-1.el9_2.aarch64.rpm |
rocky | 9 | s390x | nodejs-full-i18n | < 16.19.1-1.el9_2 | nodejs-full-i18n-1:16.19.1-1.el9_2.s390x.rpm |
rocky | 9 | aarch64 | nodejs-libs | < 16.19.1-1.el9_2 | nodejs-libs-1:16.19.1-1.el9_2.aarch64.rpm |
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.001 Low
EPSS
Percentile
49.9%