Lucene search

K
almalinuxAlmaLinuxALSA-2024:1688
HistoryApr 08, 2024 - 12:00 a.m.

Important: nodejs:20 security update

2024-04-0800:00:00
errata.almalinux.org
19
node.js
security update
cve-2023-46809
cve-2024-22019
cve-2024-21892
cve-2024-21896
cve-2024-21891
cve-2024-21890
cve-2024-22017
unix
privilege escalation
buffer internals

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

16.3%

Node.js is a software development platform for building fast and scalable
network applications in the JavaScript programming language.

Security Fix(es):

  • nodejs: vulnerable to timing variant of the Bleichenbacher attack against PKCS#1 v1.5 padding (Marvin) (CVE-2023-46809)
  • nodejs: reading unprocessed HTTP request with unbounded chunk extension allows DoS attacks (CVE-2024-22019)
  • nodejs: code injection and privilege escalation through Linux capabilities (CVE-2024-21892)
  • nodejs: path traversal by monkey-patching buffer internals (CVE-2024-21896)
  • nodejs: multiple permission model bypasses due to improper path traversal sequence sanitization (CVE-2024-21891)
  • nodejs: improper handling of wildcards in --allow-fs-read and --allow-fs-write (CVE-2024-21890)
  • nodejs: setuid() does not drop all privileges due to io_uring (CVE-2024-22017)

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.2

Confidence

Low

EPSS

0

Percentile

16.3%