rhsa-2023:5361
Vulnerability from csaf_redhat
Published
2023-09-26 14:56
Modified
2025-10-10 14:32
Summary
Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update
Notes
Topic
An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.
The following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2223679, BZ#2223681, BZ#2223683, BZ#2223685, BZ#2223687, BZ#2233892)
Security Fix(es):
* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)
* nodejs-semver: Regular expression denial of service (CVE-2022-25883)
* nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)
* nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)
* nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)
* nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)
* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)
* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* nodejs:16/nodejs: nodejs.prov doesn't generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237395)
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the nodejs:16 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language. \n\nThe following packages have been upgraded to a later upstream version: nodejs (16). (BZ#2223679, BZ#2223681, BZ#2223683, BZ#2223685, BZ#2223687, BZ#2233892)\n\nSecurity Fix(es):\n\n* nodejs: Permissions policies can be bypassed via Module._load (CVE-2023-32002)\n\n* nodejs-semver: Regular expression denial of service (CVE-2022-25883)\n\n* nodejs: mainModule.proto bypass experimental policy mechanism (CVE-2023-30581)\n\n* nodejs: process interuption due to invalid Public Key information in x509 certificates (CVE-2023-30588)\n\n* nodejs: HTTP Request Smuggling via Empty headers separated by CR (CVE-2023-30589)\n\n* nodejs: DiffieHellman do not generate keys after setting a private key (CVE-2023-30590)\n\n* nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire() (CVE-2023-32006)\n\n* nodejs: Permissions policies can be bypassed via process.binding (CVE-2023-32559)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* nodejs:16/nodejs: nodejs.prov doesn\u0027t generate the bundled dependency for modules starting @ like @colors/colors (BZ#2237395)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:5361", "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2216475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475" }, { "category": "external", "summary": "2219824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824" }, { "category": "external", "summary": "2219838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838" }, { "category": "external", "summary": "2219841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841" }, { "category": "external", "summary": "2219842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842" }, { "category": "external", "summary": "2223679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223679" }, { "category": "external", "summary": "2230948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948" }, { "category": "external", "summary": "2230955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955" }, { "category": "external", "summary": "2230956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956" }, { "category": "external", "summary": "2233892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233892" }, { "category": "external", "summary": "2237395", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237395" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_5361.json" } ], "title": "Red Hat Security Advisory: nodejs:16 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2025-10-10T14:32:17+00:00", "generator": { "date": "2025-10-10T14:32:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:5361", "initial_release_date": "2023-09-26T14:56:14+00:00", "revision_history": [ { "date": "2023-09-26T14:56:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-09-26T14:56:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T14:32:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16)", "product_id": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=aarch64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "product": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm (nodejs:16)", "product_id": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=src\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "product": { "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm (nodejs:16)", "product_id": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.6.0%2B19765%2B366b9144?arch=src\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "product": { "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm (nodejs:16)", "product_id": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.6.0%2B19856%2Bc0c87259?arch=src\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "product": { "name": "nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm (nodejs:16)", "product_id": "nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-docs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=noarch\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "product": { "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm (nodejs:16)", "product_id": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-nodemon@3.0.1-1.module%2Bel8.6.0%2B19765%2B366b9144?arch=noarch\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "product": { "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm (nodejs:16)", "product_id": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-packaging@26-1.module%2Bel8.6.0%2B19856%2Bc0c87259?arch=noarch\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16)", "product_id": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=ppc64le\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16)", "product_id": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=s390x\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debuginfo@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-debugsource@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-devel@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/nodejs-full-i18n@16.20.2-2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } }, { "category": "product_version", "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16)", "product_id": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "product_identification_helper": { "purl": "pkg:rpm/redhat/npm@8.19.4-1.16.20.2.2.module%2Bel8.6.0%2B19897%2B9590a839?arch=x86_64\u0026epoch=1\u0026rpmmod=nodejs:16:8060020230906023909:ad008a3a" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16" }, "product_reference": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16" }, "product_reference": "nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16" }, "product_reference": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16" }, "product_reference": "nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16" }, "product_reference": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16" }, "product_reference": "nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16" }, "product_reference": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16" }, "product_reference": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16" }, "product_reference": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm (nodejs:16) as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" }, "product_reference": "npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "relates_to_product_reference": "AppStream-8.6.0.Z.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-25883", "cwe": { "id": "CWE-1333", "name": "Inefficient Regular Expression Complexity" }, "discovery_date": "2023-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2216475" } ], "notes": [ { "category": "description", "text": "A Regular Expression Denial of Service (ReDoS) vulnerability was discovered in node-semver package via the \u0027new Range\u0027 function. This issue could allow an attacker to pass untrusted malicious regex user data as a range, causing the service to excessively consume CPU depending upon the input size, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs-semver: Regular expression denial of service", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Advanced Cluster Management for Kubernetes-2 and Red Hat Advanced Cluster Security-3 has been marked as Low severity because node-semver is a Dev dependency for those, used only during the build process, and not used in customer environments.\n\nIn Red Hat Advanced Cluster Management for Kubernetes (RHACM) the server-regexp dependency is protected by OAuth what is reducing impact by this flaw to Low.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-25883" }, { "category": "external", "summary": "RHBZ#2216475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216475" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-25883", "url": "https://www.cve.org/CVERecord?id=CVE-2022-25883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-25883" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw", "url": "https://github.com/advisories/GHSA-c2qf-rxjj-qqgw" }, { "category": "external", "summary": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795", "url": "https://security.snyk.io/vuln/SNYK-JS-SEMVER-3247795" } ], "release_date": "2023-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs-semver: Regular expression denial of service" }, { "cve": "CVE-2023-30581", "discovery_date": "2023-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2219824" } ], "notes": [ { "category": "description", "text": "A vulnerability has been discovered in Node.js, where the use of proto in process.mainModule.proto.require() can bypass the policy mechanism and require modules outside of the policy.json definition.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: mainModule.proto bypass experimental policy mechanism", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an IMPORTANT severity because this vulnerability is a policy bypass resulting from the improper handling of the JavaScript prototype chain. A malicious actor can trigger this flaw by using process.mainModule.__proto__.require() to load and execute modules explicitly disallowed by the policy.json configuration.\n\nSuccessful exploitation allows for the execution of unauthorized code within the context of the application process, leading to a compromise of system integrity.\n\nAt the time of this CVE\u0027s disclosure, the affected policy mechanism was designated as an experimental feature.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-30581" }, { "category": "external", "summary": "RHBZ#2219824", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219824" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30581", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30581" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30581" } ], "release_date": "2023-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: mainModule.proto bypass experimental policy mechanism" }, { "cve": "CVE-2023-30588", "discovery_date": "2023-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2219838" } ], "notes": [ { "category": "description", "text": "A vulnerability has been identified in the Node.js, where an invalid public key is used to create an x509 certificate using the crypto.X509Certificate() API a non-expect termination occurs making it susceptible to DoS attacks when the attacker could force interruptions of application processing, as the process terminates when accessing public key info of provided certificates from user code. The current context of the users will be gone, and that will cause a DoS scenario.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: process interuption due to invalid Public Key information in x509 certificates", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-30588" }, { "category": "external", "summary": "RHBZ#2219838", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219838" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30588", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30588" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30588" } ], "release_date": "2023-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: process interuption due to invalid Public Key information in x509 certificates" }, { "cve": "CVE-2023-30589", "discovery_date": "2023-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2219841" } ], "notes": [ { "category": "description", "text": "A vulnerability has been identified in the Node.js, where llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. This can lead to HTTP Request Smuggling (HRS).", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: HTTP Request Smuggling via Empty headers separated by CR", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability is in the llhttp parsing not using the CRLF sequence which violates the HTTP/1.1 specification, which mandates CRLF as the delimiter. While this might result in request smuggling, the added complexity of creating a valid malformed delimited request and having it reach the intended target and then processed,which is why this has been rated as moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-30589" }, { "category": "external", "summary": "RHBZ#2219841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30589", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30589" } ], "release_date": "2023-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: HTTP Request Smuggling via Empty headers separated by CR" }, { "cve": "CVE-2023-30590", "discovery_date": "2023-06-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2219842" } ], "notes": [ { "category": "description", "text": "A vulnerability has been identified in the Node.js, where a generateKeys() API function returned from crypto.createDiffieHellman() only generates missing (or outdated) keys, that is, it only generates a private key if none has been set yet.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: DiffieHellman do not generate keys after setting a private key", "title": "Vulnerability summary" }, { "category": "other", "text": "The generateKeys() API function returned from crypto.createDiffieHellman() in Node.js does not behave as documented as the documentation states that the function \u201cgenerates private and public Diffie-Hellman key values.\u201d However, the actual implementation only generates a private key if one has not yet been set, and does not recompute or regenerate the public key if the private key was previously defined using setPrivateKey(), which is why this could only in theory, result in weak or predictable shared secrets. The issue at hand is a developer facing hazard caused by a mismatch in the documentation and application of the function, and is not in itself a security vulnerability, which is why Redhat has assessed this as moderate.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-30590" }, { "category": "external", "summary": "RHBZ#2219842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-30590", "url": "https://www.cve.org/CVERecord?id=CVE-2023-30590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30590" } ], "release_date": "2023-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: DiffieHellman do not generate keys after setting a private key" }, { "cve": "CVE-2023-32002", "cwe": { "id": "CWE-1268", "name": "Policy Privileges are not Assigned Consistently Between Control and Data Agents" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2230948" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of Module._load() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Permissions policies can be bypassed via Module._load", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important instead of Critical because it only impacts users of the policy mechanism that must be explicitly enabled using the `--experimental-policy` flag. This is not enabled by default.\n\nRed Hat\u0027s Secure Software Development Life Cycle utilizes a layered testing approach. This significantly increases attack complexity, because a compromised package must remain undetected for months to years in testing in upstream communities before it could be adopted into a Red Hat product. This long dwell-time reduces impact to Important.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32002" }, { "category": "external", "summary": "RHBZ#2230948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230948" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32002", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32002" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32002" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002", "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-module_load-highcve-2023-32002" } ], "release_date": "2023-08-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Permissions policies can be bypassed via Module._load" }, { "cve": "CVE-2023-32006", "cwe": { "id": "CWE-213", "name": "Exposure of Sensitive Information Due to Incompatible Policies" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2230955" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of module.constructor.createRequire() can bypass the policy mechanism and require modules outside of the policy.json definition for a given module.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32006" }, { "category": "external", "summary": "RHBZ#2230955", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230955" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32006", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32006" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32006" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006", "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-impersonate-other-modules-in-using-moduleconstructorcreaterequire-mediumcve-2023-32006" } ], "release_date": "2023-08-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "nodejs: Permissions policies can impersonate other modules in using module.constructor.createRequire()" }, { "cve": "CVE-2023-32559", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2230956" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in NodeJS. This security issue occurs as the use of the deprecated API process.binding() can bypass the policy mechanism by requiring internal modules and eventually take advantage of process.binding(\u0027spawn_sync\u0027) to run arbitrary code outside of the limits defined in a policy.json file.", "title": "Vulnerability description" }, { "category": "summary", "text": "nodejs: Permissions policies can be bypassed via process.binding", "title": "Vulnerability summary" }, { "category": "other", "text": "When this CVE was reported, the policy.json file was still experimental in nature and not deployed and widely in environments,which is why at the time when this CVE was submitted,Redhat chose to classify this as moderare.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32559" }, { "category": "external", "summary": "RHBZ#2230956", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230956" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32559", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32559" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32559" }, { "category": "external", "summary": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559", "url": "https://nodejs.org/en/blog/vulnerability/august-2023-security-releases#permissions-policies-can-be-bypassed-via-processbinding-mediumcve-2023-32559" } ], "release_date": "2023-08-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-09-26T14:56:14+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:5361" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debuginfo-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-debugsource-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-devel-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-docs-16.20.2-2.module+el8.6.0+19897+9590a839.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-full-i18n-16.20.2-2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-nodemon-3.0.1-1.module+el8.6.0+19765+366b9144.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.noarch.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:nodejs-packaging-26-1.module+el8.6.0+19856+c0c87259.src.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.aarch64.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.ppc64le.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.s390x.rpm-nodejs:16", "AppStream-8.6.0.Z.EUS:npm-8.19.4-1.16.20.2.2.module+el8.6.0+19897+9590a839.x86_64.rpm-nodejs:16" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "nodejs: Permissions policies can be bypassed via process.binding" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…