Lucene search

K
rockyRockylinux Product ErrataRLSA-2022:8833
HistoryDec 06, 2022 - 3:25 p.m.

nodejs:18 security, bug fix, and enhancement update

2022-12-0615:25:28
Rockylinux Product Errata
errata.rockylinux.org
28
node.js
node.js-nodemon
node.js-packaging
security update
bug fix
enhancement
rocky linux 8
cve
cvss
dns rebinding
redos
invalid octal ip address
vulnerability

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.7%

An update is available for nodejs-nodemon, nodejs, nodejs-packaging.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.

The following packages have been upgraded to a later upstream version: nodejs (18.12.1), nodejs-nodemon (2.0.20). (BZ#2142818)

Security Fix(es):

  • nodejs-minimatch: ReDoS via the braceExpand function (CVE-2022-3517)

  • nodejs: DNS rebinding in inspect via invalid octal IP address (CVE-2022-43548)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.006

Percentile

79.7%